LATEST NEWS
SELECTED FOR YOU
WEEKLY
STAY ON TOP

Best crypto insights delivered straight to your inbox.

Huma Finance loses $101K in Polygon exploit on same day as Ink breach

ByRanda MosesRanda Moses
2 mins read
Huma Finance loses $101K in Polygon exploit on same day as Ink breach.
  • Huma Finance’s legacy V1 smart contracts on Polygon got drained for $101,400 in USDC.
  • The company says no user funds were at risk and its newer V2 system on Solana is unaffected.
  • The exploit hit on the same day as a separate $140,000 drain on Ink Finance.

An attack on the V1 smart contracts of Huma Finance on Polygon resulted in a loss of $101,400 USDC. The exploit added to what’s already been a difficult time for DeFi protocols on the network.

The exploit was reported by web3 security firm Blockaid. The attacker targeted BaseCreditPool deployments related to Huma’s older V1 infrastructure. The total loss was ~$101,400 in USDC and USDC.e coins across various contracts.

Huma Finance confirmed the incident on X, saying “No user funds at risk and PST is not impacted.” The team said its V2 system, which runs on Solana, was built from scratch. It shares no code with the compromised contracts.

Huma’s V1 flaw was in one function

The smart contract flaw was found inside a function named refreshAccount(). Its a function located within the V1 BaseCreditPool contracts. Blockaid security researchers identified the bug. They shared more information on X, saying:

“Bug: refreshAccount() unconditionally promotes a Requested credit line to GoodStanding, bypassing the EA approval step and enabling drawdown().”

refreshAccount() labelled accounts with ‘good standing’ without actual verification or conditions. The attacker took advantage of this flaw and drained funds from the protocol’s treasury pools

The losses were found in three contracts according to Blockaid’s on-chain analysis. One account lost ~82,300 USDC. A second lost ~17,300 USDC.e. And a third account lost ~1,800 USDC.e. According to on-chain data, the entire exploit was completed in one transaction.

There was no cryptographic issue. The attacker just changed the contract’s state machine to trick it into treating an unauthorized account as legit.

Huma’s team wrote on X, “Earlier today a vulnerability in Huma’s legacy v1 contracts on Polygon was exploited for 101,400 USDC.” They continued, “Huma’s v2 system on Solana is a complete rewrite and this issue does not apply to v2 systems.”

Huma said it had already been winding down V1 operations before the exploit occurred. The team said on X, “The teams were already in the process of sunsetting all the legacy v1 pools, and have paused v1 completely now.”

After the incident, the team fully paused all remaining V1 contracts. The company said that user deposits on V2 were untouched and that the newer platform continues to operate normally.

Polygon had a bad day

According to a recent report from Cryptopolitan, the exploit took place on the same day that Ink Finance lost almost $140,000 from its Workspace Treasury Proxy contract on Polygon. The attacker deployed a contract matching a whitelisted claimer address to bypass eligibility checks.

In both incidents, the attackers found logic mistakes in smart contract design. The back-to-back exploits on Polygon come after April 2026, setting the record for the worst month of smart contract losses.

Don’t just read crypto news. Understand it. Subscribe to our newsletter. It's free.

FAQs

How much was stolen in the Huma Finance exploit?

Around $101,400 in USDC and USDC.e got drained from Huma Finance's deprecated V1 BaseCreditPool contracts on Polygon on May 11, 2026.

Are Huma Finance user funds safe?

Huma Finance stated that no user funds are at risk. Its current V2 system on Solana is a complete rewrite and the V1 vulnerability doesn't touch it.

What caused the vulnerability?

A logic flaw in the `refreshAccount()` function within the V1 BaseCreditPool contracts improperly upgraded an account's status without adequate validation. That let the attacker bypass authorization checks and withdraw funds.

Share this article

Disclaimer. The information provided is not trading advice. Cryptopolitan.com holds no liability for any investments made based on the information provided on this page. We strongly recommend independent research and/or consultation with a qualified professional before making any investment decisions.

MORE … NEWS
DEEP CRYPTO
CRASH COURSE