How Twitter Helped Avert a Critical Exploit

A Twitter user helped prevent a 200 billion BitBTC exploit

article-image

Source: DALL·E

share
  • This vulnerability was not in Optimism’s code, but rather in a custom bridge provided by BitBTC
  • BitBTC’s custom bridge code did not acknowledge the specific layer-2 token being minted to the layer-1 address

A Twitter user has helped avert a potential exploit after publicly flagging a vulnerability in BitBTC’s Optimism bridge — the latest such near-miss amidst a year full of “successful” thefts. 

Lee Bousfield, a tech lead at Ethereum scaling solution Arbitrum — PlasmaPower0 on Twitter — published what he dubbed a critical exploit after he said his messages were ignored by BitBTC. 

Loading Tweet..

The BitBTC bridge to or from Optimism’s blockchain facilitates withdrawals of any token between layer-2 and a corresponding layer-1 wallet. But, the BitBTC code involved does not acknowledge what the layer-2 token actually is —and mints an arbitrary layer-1 to match. 

“That means an attacker could deploy their own token on Optimism, give themselves all the supply, and set that token’s L1Token to the real BitBTC L1 address,” Bousfield tweeted.

“When the attacker withdraws their malicious token through the BitBTC bridge, it gives them real BitBTC tokens on L1,” he said.

Of note, the apparent vulnerability was not in Optimism’s code, but rather in a custom bridge facilitated by BitBTC, according to Kelvin Fichter, an Optimism developer. Meaning, he said, no assets other than BitBTC assets were at risk.

“We put a lot of time and energy into the standard bridge and I highly recommend using the standard bridge rather than rolling your own custom bridge unless you really know what you’re doing,” Fichter tweeted.

The next day, an attacker — who claimed he was testing the code, tried to withdraw 200 billion BitBTC from Optimism. 

The exploit was able to be stopped as the process of withdrawing the token from the bridge would have taken seven days, and BitBTC in the interim patched the vulnerability via a software update.

“The attacks will now fail when they arrive on L1. Thanks everyone for making noise and helping get this fixed,” Bousfield tweeted.

Bousfield did not immediately return a request for comment.


Get the news in your inbox. Explore Blockworks newsletters:

Tags

Decoding crypto and the markets. Daily, with Byron Gilliam.

Upcoming Events

Javits Center North | 445 11th Ave

Tues - Thurs, March 24 - 26, 2026

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

recent research

Flying_Tulip.png

Research

Flying Tulip's perpetual put option provides real principal protection, but investors must pay a valuation premium today for products that have to be built over the next 24 months. This structure works best as a stablecoin substitute where the put allows continuous monitoring—accept opportunity cost in exchange for asymmetric upside if the team executes on its ambitious cross-collateral architecture.

article-image

As flows consolidate and volatility fades, finding edge now means knowing which games are still worth playing

article-image

Value distribution came to $1.9 billion distributed in Q3, though total revenues have yet to beat 2021 heights

article-image

MegaETH public sale auction ends tomorrow, and the free money machine has attracted people who like free money

article-image

With tBTC under the hood, Acre abstracts bridging and converts non-BTC rewards to bitcoin

article-image

Accountable is also eyeing mid-November for mainnet launch

article-image

“Adjusted for size, I think it may be the most successful ETP launch of all time,” Bitwise CIO Matt Hougan says