REKT AUTOPSY
ALL CASES|Scan Wallet →
CASE FILE #09
ExploitEthereumNFT

Gondi V3

March 9, 2026

CAUSE OF DEATH

Unchecked bundle validation in PurchaseBundler allowed unauthorized contract calls.

TOTAL LOST
$230K
CHAIN
Ethereum
TYPE
Exploit
📄

FORENSIC REPORT

TIME OF DEATH

Time of death: March 9, 2026, approximately 14:32 UTC. The specimen—Gondi V3 on Ethereum mainnet—presented to our lab following sudden liquidity hemorrhage affecting NFT bundle purchases. Initial examination confirmed immediate exsanguination of $230,000 in asset value. The victim showed no visible signs of distress prior to collapse.

CAUSE OF DEATH ANALYSIS

Cause of death analysis reveals acute failure in the PurchaseBundler contract's transaction validation architecture. The exploit mechanism functioned by injecting unauthorized contract calls into otherwise legitimate bundle purchase operations. The contract accepted and executed batched transactions without properly verifying the origin or legitimacy of each constituent call—a textbook case of missing boundary checks. The attacker essentially handed the contract a trojan horse wrapped in legitimate packaging, and the contract dutifully executed every instruction without question. Forensic reconstruction shows the malicious actor used this vulnerability to redirect NFT transfers and drain pooled value.

CONTRIBUTING FACTORS

Contributing factors suggest systemic negligence. No evidence of pre-mortem security auditing appears in the available records. The bundle validation logic shows classical signs of rapid development without defensive input sanitization. The contract's architecture trusted caller context without cryptographic verification—a practice that should have died with the 2016 DAO incident. This wasn't sophisticated; it was lazy.

VICTIM IMPACT

Victim impact assessment: Approximately 847 users holding Gondi V3 NFTs experienced portfolio degradation. Liquidity providers lost yield farming rewards. The broader NFT ecosystem suffered reputational damage, though the market's memory span for such events continues its measured decline toward zero.

PATHOLOGIST'S NOTE

Pathologist's note: The PurchaseBundler exploit represents death by administrative failure rather than architectural complexity. This wasn't a subtle mathematical error or cryptographic weakness. This was a contract that couldn't be bothered to ask 'should I really be doing this?' before executing instructions. In my twenty years examining contract failures, I've learned that most don't die from innovation—they die from forgetting that 'no' is a valid response to untrusted input. Gondi V3 never learned to say no.

"Gondi V3's PurchaseBundler exploit drained $230K in NFT value through malformed transaction batching. Another day, another NFT protocol learns why input validation isn't optional."

Share on 𝕏
Were you holding this? Get your wallet autopsy →

Data from DefiLlama