Overbase Finance
December 18, 2020
Hidden minting function exploited by deployer. Classic rug pull architecture.
FORENSIC REPORT
TIME OF DEATH: December 18, 2020, approximately 23:59 UTC. Circumstances indicate a coordinated extraction event spanning multiple blockchain transactions. Initial liquidity injection occurred at block height [reference tx 0xb3a5...], establishing the appearance of legitimate market conditions. Death was not sudden; it was methodical.
CAUSE OF DEATH ANALYSIS: Post-mortem examination of the contract bytecode reveals a concealed minting mechanism within the addTransaction() function—a function that should have had no business touching token supply. The deployer executed two separate minting transactions (0x37c4...and 0x1d4f...), inflating the token supply beyond disclosed parameters. This hidden lever operated beneath the surface, invisible to casual observers but obvious to anyone reading the actual code. The specimen demonstrates what we in the forensic community call 'obfuscation through nomenclature'—hiding lethal functionality behind innocent-sounding function names.
CONTRIBUTING FACTORS: The warning signs were present but ignored. No verified audit. No multi-sig protection on minting. No time locks. No supply caps in the contract itself. This was a loaded gun sitting on a table with a sign that said 'Don't touch'—except the gun was invisible unless you knew exactly where to look. The deployer maintained unilateral control over token creation, a red flag that should have triggered immediate scrutiny.
VICTIM IMPACT: $4,275 in losses distributed across an unknown number of liquidity providers who believed they were supporting a legitimate project. Each transaction represents real people who thought they'd found an opportunity. The amount is modest by modern standards, but in December 2020, it represented someone's rent money, trading capital, or holiday savings.
PATHOLOGIST'S NOTE: We catalog this specimen as a Grade-A rug pull—elegant in its simplicity, devastating in its execution. The deployer didn't need sophisticated flash loans or complex attack vectors. They simply wrote hidden minting into the contract, added liquidity to create the illusion of legitimacy, minted more tokens, sold them to early adopters, and ghosted. I've performed 10,000 autopsies in this space, and the classic ones never change. They just change their names.
"Overbase Finance exhibits textbook rug pull pathology: deployer minted tokens from thin air, dumped on unsuspecting liquidity providers, and vanished with $4.3K. The addTransaction() function was a murder weapon disguised as infrastructure."
Data from De.Fi REKT Database