REKT AUTOPSY
ALL CASES|Scan Wallet →
CASE FILE #28
ExploitEthereum

SuperRare

July 28, 2025

CAUSE OF DEATH

Unrestricted updateMerkleRoot function allowed unauthorized root manipulation.

TOTAL LOST
$730K
CHAIN
Ethereum
TYPE
Exploit
📄

FORENSIC REPORT

TIME OF DEATH

Time of death: July 28, 2025, approximately 00:00 UTC. The specimen—SuperRare's NFT infrastructure on Ethereum—was found exsanguinated of $730,000 in digital assets. Initial scene assessment indicates a clean, surgical strike targeting the updateMerkleRoot function. No signs of struggle. The victim was unconscious to its own vulnerability.

CAUSE OF DEATH ANALYSIS

Cause of death analysis: The pathologist's findings are unambiguous. The updateMerkleRoot function lacked proper access controls—a function so critical to verification integrity that it should have been locked behind multiple authentication gates. Instead, it was left exposed like an unlocked pharmacy at 2 AM. The attacker simply walked in and rewrote the merkle root, the cryptographic foundation upon which the entire verification system depends. Once compromised, the root becomes a skeleton key. Everything downstream trusts it implicitly. The specimen's immune system—its permission checks—had simply... stopped working.

CONTRIBUTING FACTORS

Contributing factors: Classic negligence autopsy findings. No emergency pause mechanisms detected. No multi-signature requirements. No timelock. The developers appear to have operated under the fatal assumption that 'nobody would think to try this.' In our experience, somebody always thinks to try it. The warning signs were there—they're always there. Unaudited or partially audited code paths. Elevated privilege functions with minimal oversight. The equivalent of leaving the ICU unattended.

VICTIM IMPACT

Victim impact: The specimen's users sustained direct trauma. $730,000 in confirmed losses. Depending on distribution patterns, this likely affects anywhere from dozens to hundreds of NFT holders and liquidity providers. Secondary victims include the platform's reputation and future capital access. The wound is clean but deep.

PATHOLOGIST'S NOTE

Pathologist's note: In twenty years of examining these cases, I've learned that access control vulnerabilities are the cancer of smart contract security—often invisible until you're already terminal. SuperRare had all the right components; they just forgot to install the locks. Another high-profile project joins our collection. Mark this one down as death by administrative hubris. Time to schedule the next one.

"SuperRare's access control failed spectacularly. An exposed merkle root update function became a $730K open invitation. The victim never saw it coming."

Share on 𝕏
Were you holding this? Get your wallet autopsy →

Data from DefiLlama