A lending protocol planned to enable a new collateral type with dynamic interest updates every block. The change touched liquidation logic and oracle dependency paths.
An attacker could manipulate a thin oracle market, trigger inflated collateral valuation for 2-3 blocks, borrow aggressively, and exit before liquidation recalibration.
ARES simulation detected a 4.8x abnormal borrow surge under low-liquidity conditions and identified that liquidation calls lagged by one update cycle. Three pre-positioned wallets mirrored known exploit prep patterns.
Deployment paused for 36 hours. Team implemented multi-source oracle sanity checks, collateral ceiling limits, and an emergency market freeze hook. Risk thresholds were added to launch monitoring.
No exploit loss occurred. Estimated prevented exposure: $42M to $57M. Post-patch stress testing reduced exploit window from 3 blocks to below executable threshold in adversarial simulations.
Economic assumptions must be treated as security assumptions. Oracle fragility plus timing latency can convert healthy code into extractable value paths.
ARES Foundation