|

Polymarket suffers live POL drain as team rules out feared contract exploit

Crypto finds $64B product market fit in 2025 but reliance on centralized logins has created a critical security flaw

Polymarket confronted what many customers interpreted as a doable hack on May 22 after public alerts described a fast POL drain on the prediction market platform. Polymarket-linked accounts later mentioned the incident was not a smart-contract exploit and didn’t have an effect on consumer funds or market decision.

The first wave of concern got here from on-chain investigator ZachXBT and blockchain analytics agency Bubblemaps. ZachXBT mentioned a Polymarket admin deal with appeared to have been compromised on Polygon, with greater than $520,000 drained on the time of his Telegram alert.

Bubblemaps then warned that attackers had been eradicating 5,000 POL roughly each 30 seconds and that about $600,000 had been stolen to this point, whereas advising customers to pause Polymarket exercise.

Polymarket’s later clarification shifted the difficulty away from core-market failure and towards an inside operational safety breach. Findings pointed to a private-key compromise of a pockets used for “internal top-up operations,” in response to Polymarket Developers, moderately than “contracts or core infrastructure.”

Polymarket software program engineer Shantikiran Chanal equally said, “User funds and market decision are secure,” including that the difficulty was linked to rewards payout stories.

That implies completely different dangers. A contract or decision failure would elevate questions on whether or not markets may settle accurately or whether or not consumer positions had been uncovered. An inside funding-wallet compromise, whereas nonetheless critical, factors as a substitute to key administration, refiller providers, and operational controls round wallets that assist the platform.

Crypto finds $64B product market fit in 2025 but reliance on centralized logins has created a critical security flaw
Related Reading

Crypto finds $64B product market fit in 2025 but reliance on centralized logins has created a critical security flaw

Mainstream adoption of prediction markets raises systemic trust challenges and highlights ambiguities in resolution mechanisms for crypto platforms.
Feb 11, 2026
·
Oluwapelumi Adejumo

Timeline showing ZachXBT and Bubblemaps alerts followed by Polymarket-linked statements that user funds, market resolution, and the CTF contract were safe.

The public alert moved sooner than the personal key compromise clarification

The timeline moved rapidly. ZachXBT’s Telegram submit at 08:22 UTC described a Polymarket admin deal with as apparently compromised on Polygon and recognized the attacker deal with as 0x8F98075db5d6C620e8D420A8c516E2F2059d9B91.

The identical submit listed associated and drained addresses, giving on-chain analysts a path to observe.

Bubblemaps amplified the warning at 08:51 UTC, describing the state of affairs as a Polymarket contract exploit, the type of Polymarket exploit alert that will elevate instant concern about core infrastructure, and saying the attacker was eradicating 5,000 POL each 30 seconds.

On-chain knowledge present why the warning drew consideration. A PolygonScan transaction at 09:01:19 UTC exhibits 5,000 POL transferring right into a Polymarket-labeled UMA CTF Adapter Admin deal with.

Seven seconds later, one other PolygonScan transaction exhibits 4,999.994 POL transferring from that labeled admin deal with to the labeled attacker deal with. The attacker deal with web page is tagged by PolygonScan as “Polymarket Adapter Exploiter 1” and exhibits repeated transfers across the alert window.

That transaction pair helps the seen drain sample that triggered the general public alarm and provides a concrete instance of the type of switch movement that Polymarket team members later described as involving an inside refiller, whereas leaving root trigger to the team’s statements.

Question Initial alert Polymarket-linked clarification
What was occurring? Bubblemaps warned that 5,000 POL was being eliminated roughly each 30 seconds. Team statements linked the stories to rewards payout or inside top-up exercise.
Was it a contract exploit? Bubblemaps initially described it as a Polymarket contract exploit. Polymarket-linked accounts mentioned findings pointed away from contracts or core infrastructure.
Were consumer funds affected? The first alert suggested customers to pause exercise. Shantikiran Chanal and Polymarket Developers mentioned consumer funds and market decision had been secure.
What stays unresolved? The live loss estimate was about $600,000 at Bubblemaps’ alert. The remaining loss quantity, full affected-address set, and remediation particulars had been nonetheless unsettled.

Polymarket’s stablecoin launch looks bearish for USDC, but the real shift runs deeper
Related Reading

Polymarket’s stablecoin launch looks bearish for USDC, but the real shift runs deeper

Polymarket’s new token may not cut USDC demand, but it could make that demand harder to see and easier to misread.
Apr 7, 2026
·
Andjela Radmilac

Detective interrogates Polymarket contracts after POL drain alert

Team statements pointed to a Polymarket personal key compromise

The clearest official wording got here from the Polymarket Developers account, which framed the incident as a Polymarket personal key compromise involving a pockets used for inside top-up operations.

That phrasing strikes the incident out of the class of a direct smart-contract vulnerability and right into a extra operational query: who managed the important thing, the way it was uncovered, and why the affected course of stored sending POL into an deal with that could possibly be drained.

Chanal’s assertion used related language, saying the stories had been linked to rewards payout and that findings pointed to a private-key compromise of a pockets used for inside operations. In replies to customers, Chanal mentioned wallets had been “utterly secure” and mentioned the team was investigating backend programs and secrets and techniques whereas rotating keys.

Mustafa, one other Polymarket-linked supply, gave essentially the most direct clarification of the contract distinction. He said “The CTF contract shouldn’t be exploited,” including that the difficulty concerned an inside ops deal with utilized by a service that checks and refills balances each few seconds.

He additionally mentioned all consumer funds had been secure and that the deal with was being rotated.

Polymarket’s personal documentation helps clarify the stakes behind that distinction. The platform says markets use UMA for decision and that successful positions are redeemed after decision by means of CTF-related mechanics.

Polymarket faces major credibility crisis after whales forced a “YES” UFO vote without evidence
Related Reading

Polymarket faces major credibility crisis after whales forced a “YES” UFO vote without evidence

Late-night traders bought odds at 99 cents just before a token-weighted vote overruled the public consensus, exposing a massive flaw in “truth” markets.
Dec 10, 2025
·
Liam ‘Akiba’ Wright

Its CTF documentation describes end result tokens for prediction markets and notes that Yes/No pairs are totally collateralized. Against that background, a direct failure in CTF or decision infrastructure would elevate completely different questions from a compromised pockets used for rewards or inside top-ups.

The recognized team statements place the difficulty exterior the core market-resolution infrastructure. They go away the operational-security query open.

Flow diagram separating the internal top-up and refiller path from Polymarket core market infrastructure, with open remediation questions listed.

Private keys are the authority layer for blockchain wallets, and a compromised inside key can nonetheless transfer funds, set off public panic, and expose weaknesses in monitoring or automated funding flows even when customers’ buying and selling balances and market settlement usually are not the goal.

The subsequent replace must settle the loss and remediation particulars

For customers proper now, Polymarket’s team says the incident was restricted to inside operations, which means Polymarket consumer funds, core contracts, and market-resolution processes had been exterior the affected path.

The remaining query is how a lot was finally misplaced and what modified after the team found the compromised key.

ZachXBT’s first out there determine was greater than $520,000 drained. Bubblemaps later mentioned about $600,000 had been stolen on the time of its alert.

On-chain pages present a consultant switch path, however the present public report leaves the ultimate audited loss quantity, full set of affected addresses, and restoration standing unsettled.

The operational follow-up is simply as essential. Polymarket-linked statements mentioned the affected deal with was being rotated and that the team was investigating backend programs and secrets and techniques.

That leaves a number of live questions: whether or not rotation has been accomplished, whether or not any linked refiller-service credentials had been uncovered, whether or not the compromised pockets had permissions past the noticed transfers, and whether or not the platform will publish an incident report explaining the failure.

For merchants, the sensible takeaway is that the preliminary public wording seems to have overstated the contract-exploit angle based mostly on the later Polymarket team statements. A live drain of inside funds stays a safety incident, particularly for a platform whose customers depend on clear separation between operational wallets, rewards programs, and market infrastructure.

Until Polymarket points a remaining replace, the team has informed customers their funds and market decision are secure, whereas the general public chain report exhibits a fast POL drain from Polymarket-labeled infrastructure.

The subsequent disclosure must state the ultimate loss, verify the deal with rotation, and clarify what modified after a Polymarket personal key compromise turned an inside pockets into the middle of a live-drain alarm.

The submit Polymarket suffers live POL drain as team rules out feared contract exploit appeared first on CryptoSlate.

Similar Posts