Futures
Access hundreds of perpetual contracts
CFD
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Pre-IPOs
Unlock full access to global stock IPOs
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Promotions
AI
Gate AI
Your all-in-one conversational AI partner
Gate AI Bot
Use Gate AI directly in your social App
GateClaw
Gate Blue Lobster, ready to go
Gate for AI Agent
AI infrastructure, Gate MCP, Skills, and CLI
Gate Skills Hub
10K+ Skills
From office tasks to trading, the all-in-one skill hub makes AI even more useful.
GateRouter
Smartly choose from 40+ AI models, with 0% extra fees
INK Finance loses $140K as whitelist bypass exploit targets treasury infrastructure – Details
INK Finance, a DeFi treasury management and workspace infrastructure protocol on Polygon, recently suffered a major authorization breach. Attackers drained roughly $140,000 after exploiting weaknesses inside the platform’s treasury verification logic.
The attack unfolded after a spoofed claimer contract successfully impersonated an approved whitelisted entity within the treasury system. That bypass allowed attackers to pass eligibility checks and trigger an authorized treasury transfer without immediate restrictions.
Source: X
Meanwhile, the exploit gained additional execution speed through a roughly $25,000 Balancer V2 flash loan routed from Railgun into Polygon. That flow highlighted how interconnected liquidity systems increasingly improve exploit efficiency across DeFi infrastructure.
Rather than targeting advanced cryptographic layers, attackers exploited operational trust assumptions surrounding whitelist permissions, reinforcing growing concerns around weak authorization design across treasury architectures.
Treasury authorization systems become DeFi’s weakest layer
That treasury breach increasingly reflected a broader shift across DeFi’s evolving attack landscape beneath growing infrastructure complexity. Instead of targeting liquidity pools or pricing systems, attackers increasingly focused on privileged treasury authorization layers holding concentrated protocol reserves.
INK Finance’s exploit also reinforced how attackers increasingly target treasury authorization systems through low-cost, high-precision execution strategies. That pattern highlighted how modern exploit methods increasingly prioritize privilege escalation over broader liquidity manipulation techniques.
Meanwhile, similar whitelist and access-control incidents have continued to rise across DAO-managed treasury systems throughout 2026. Those repeated failures increasingly exposed weaknesses across operational validation layers beneath expanding DeFi infrastructure.
However, persistent authorization flaws have also highlighted how operational security maturity still lags behind accelerating infrastructure and capital growth across decentralized finance.
Small exploits continue to weaken DeFi confidence
That growing wave of treasury authorization exploits has increasingly started weighing on broader confidence across DeFi infrastructure. INK Finance’s exploit remained relatively small financially, though the incident still spread rapidly across security dashboards and on-chain monitoring systems.
That visibility matters because users increasingly interpret repeated low-value breaches as signals of unresolved infrastructure fragility beneath ecosystem growth. Meanwhile, similar incidents involving SmartCredit, Sharwa, and Quant have continued to reiterate broader concerns around weak operational security discipline.
The incident also exposed why smaller exploits still carry disproportionate market impact, despite limited direct financial damage. Repeated authorization failures gradually weaken user confidence, slow capital deployment, and increase caution across interconnected DeFi systems.
However, many of these breaches still emerge from preventable permission flaws rather than sophisticated technical failures. Put simply, operational maturity continues to lag behind infrastructure complexity.
Final Summary