PRXVT
January 1, 2026
Sybil attack via CREATE2 address spoofing. Protocol never stood a chance.
FORENSIC REPORT
Time of death: January 1, 2026, approximately 00:00 UTC. The victim, PRXVT, was discovered unresponsive on the Base chain following what appears to be a coordinated Sybil attack utilizing CREATE2 address generation mechanics. Initial responders noted the protocol had been drained of approximately $97,000 in liquid assets. The patient showed no signs of revival.
Cause of death analysis: The specimen's authentication mechanisms were fundamentally compromised through CREATE2 address spoofing. The attacker(s) generated multiple addresses that mimicked legitimate protocol participants, exploiting the deterministic nature of CREATE2 to forge identities within the system. Without robust identity verification or rate-limiting mechanisms, the protocol accepted these fraudulent actors as distinct participants, allowing them to accumulate disproportionate influence and drain liquidity pools. The pathology is clear: the victim conflated address uniqueness with participant uniqueness. A fatal error in cryptographic assumptions.
Contributing factors: The autopsy reveals several pre-existing conditions that accelerated mortality. Lack of Sybil-resistant mechanisms (proof-of-personhood, stake-weighted voting, or economic friction) created a permissive environment for identity multiplication. No maximum position limits per address. Insufficient monitoring for suspicious patterns—multiple addresses draining in coordinated fashion went undetected until post-mortem. These were not hidden defects; they were architectural choices that left the patient exposed in an ecosystem known for predatory behavior.
Victim impact: Liquidity providers suffered total capital loss. Early investors absorbed the full $97,000 hemorrhage. The Base ecosystem's reputation sustained minor trauma—another name added to the long list of protocols that underestimated adversarial creativity.
Pathologist's note: I've performed autopsies on thousands of these specimens, and they all tell the same story: developers ship with theoretical security models rather than adversarial ones. CREATE2 is a scalpel; in untrained hands, it becomes a murder weapon. PRXVT simply never learned to recognize its attacker wearing its own face.
"PRXVT flatlined on Base after attackers cloned identities with CREATE2 addresses. $97K exsanguinated. Another day, another identity crisis in crypto."
Data from DefiLlama