When Depth Becomes an Illusion: Polymarket Faces 'Order Attack' Stress Test

比推Pubblicato 2026-02-26Pubblicato ultima volta 2026-02-26

Introduzione

A sophisticated "order attack" is exploiting a critical vulnerability in Polymarket's hybrid off-chain matching/on-chain settlement system. For less than $0.10 in gas fees on Polygon, an attacker can initiate a trade and then, in the brief window before on-chain execution, drain their wallet via a high-gas transfer. This causes the initial trade to fail on-chain due to insufficient funds. However, Polymarket's off-chain system responds by forcibly removing all the legitimate market maker orders that were matched with the failed transaction. This attack has two primary profit methods. First, attackers clear the order book of competitors, create a liquidity vacuum, and then place their own orders with artificially wide spreads to monopolize trading. Second, they "hunt" automated trading bots: after a trade is matched off-chain, a bot hedges its new position, but the attacker then forces the original trade to fail on-chain. This leaves the bot with an unhedged, risky position, which the attacker exploits for profit. One identified attacker address, created in February 2026, reportedly profited over $16,000 in a single day by targeting just 7 markets. The attack severely undermines market maker confidence, threatens the platform's liquidity, and exposes a fundamental design flaw. While the community has developed monitoring tools, Polymarket team has not yet issued an official fix.

Author: Frank, PANews

Original Title: Less Than 10 Cents Collapses Millions in Liquidity, Order Attacks May Empty Polymarket's Liquidity Foundation


A single on-chain transaction costing less than $0.10 can instantly wipe out market-making orders worth tens of thousands of dollars from Polymarket's order book. This is not a theoretical scenario but a reality that is currently unfolding.

In February 2026, a user disclosed a new type of attack targeting Polymarket's market makers on social media. Blogger BuBBliK described it as "elegant & brutal" because the attacker only needs to pay less than $0.10 in Gas fees on the Polygon network to complete an attack cycle in about 50 seconds. The victims—market makers and automated trading bots who have placed buy and sell orders with real money—face multiple blows: forced order removal, passive exposure of positions, and even direct losses.

PANews reviewed an attacker address flagged by the community and found that the account was registered in February 2026, participated in only 7 markets, but has already recorded a total profit of $16,427, with the core gains made essentially within a single day. When the liquidity foundation of a prediction market leader valued at $9 billion can be leveraged at a cost of a few cents, this exposes far more than just a technical vulnerability.

PANews will delve into the technical mechanisms, economic logic, and potential impact of this attack on the prediction market industry.

How the Attack Happens: A Precision Hunt Exploiting a "Time Gap"

To understand this attack, one must first understand Polymarket's trading process. Unlike most DEXs, Polymarket uses a hybrid architecture of "off-chain matching + on-chain settlement" to pursue a user experience close to that of centralized exchanges. User order placement and matching are completed instantly off-chain, and only the final fund settlement is submitted to the Polygon chain for execution. This design allows users to enjoy zero-Gas order placement and second-level execution, but it also creates a "time gap" of a few seconds to over ten seconds between off-chain and on-chain processes. The attacker precisely targets this window.

The attack logic is not complex. The attacker first places a buy or sell order normally via the API. At this time, the off-chain system verifies the signature and balance without issue and matches it with other market makers' orders on the order book. But almost simultaneously, the attacker initiates an on-chain USDC transfer with an extremely high Gas fee, transferring all the funds out of the wallet. Because the Gas fee is much higher than the platform relayer's default settings, this "draining" transaction is confirmed by the network first. When the relayer subsequently submits the matching result to the chain, the attacker's wallet is already empty, and the transaction fails and rolls back due to insufficient balance.

If the story ended here, it would only waste a bit of the relayer's Gas fee. But the truly fatal step is this: although the transaction fails on-chain, Polymarket's off-chain system will forcibly remove all the innocent market maker orders that participated in this failed matching from the order book. In other words, the attacker uses a transaction destined to fail to "one-click clear" the buy and sell orders placed by others with real money.

To use an analogy: It's like shouting a high bid at an auction, then turning around at the moment the hammer falls and saying "I have no money," but the auction house confiscates all the bidding paddles of the other normal bidders, causing the auction to fail.

It is worth noting that the community later discovered an "upgraded version" of this attack, named "Ghost Fills." The attacker no longer needs to front-run the transfer but directly calls the "cancel all orders" function on the contract after the order is matched off-chain and before on-chain settlement, instantly invalidating their own order to achieve the same effect. More cunningly, the attacker can place orders in multiple markets simultaneously, observe the price trend, then only keep the favorable orders to execute normally and use this method to cancel the unfavorable ones, essentially creating a "win-only" free option.

Attack "Economics": A Few Cents in Cost, $16,000 in Profit

Beyond directly clearing market maker orders, this state desynchronization between off-chain and on-chain is also used to hunt automated trading bots. According to monitoring by the GoPlus security team, affected bots include Negrisk, ClawdBots, MoltBot, and others.

The attacker clearing others' orders and creating "ghost fills" do not directly generate profits themselves. So how is the money actually made?

PANews found that the attacker's profit paths mainly follow two routes.

The first is "monopolizing market making after clearing the field." Under normal circumstances, the order book of a popular prediction market has multiple market makers competing to place orders. The spread between the best bid and ask is usually narrow, for example, bids at 49 cents and asks at 51 cents, with market makers earning微利 from the 2-cent spread. The attacker repeatedly initiates "doomed-to-fail transactions" to forcibly clear all these competitors' orders. The market then becomes a vacuum. The attacker immediately places their own buy and sell orders but with a significantly widened spread, for example, bids at 40 cents and asks at 60 cents. Other users needing to trade, having no better quotes, are forced to accept this price, allowing the attacker to profit from the 20-cent "monopoly spread." This mode cycles: clear the field, monopolize, profit, clear again.

The second profit path is more direct: "hunting hedging bots." A concrete example illustrates this: Suppose the price of "Yes" in a certain market is 50 cents. The attacker places a $10,000 "Yes" buy order to a market-making bot via the API. After the off-chain system confirms the match, the API immediately tells the bot, "You have sold 20,000 shares of Yes." Upon receiving the signal, the bot, to hedge risk, immediately buys 20,000 shares of "No" in another related market to lock in profits. But then, the attacker causes that $10,000 buy order to fail and roll back on-chain, meaning the bot actually never sold any "Yes." The hedge position it thought it had now becomes a naked one-sided bet, holding only 20,000 shares of "No" without the corresponding short position to protect it. The attacker then trades in the market for real, profiting from the bot being forced to sell these unprotected positions or directly arbitraging from the market price shift.

On the cost side, each attack cycle only requires paying less than $0.10 in Gas fees on the Polygon network. Each cycle takes about 50 seconds, theoretically allowing about 72 executions per hour. One attacker set up a "dual-wallet循环系统" (Cycle A Hub and Cycle B Hub operating alternately), achieving fully automated high-frequency attacks. Hundreds of failed transactions have been recorded on-chain.

On the profit side, an attacker address flagged by the community and reviewed by PANews shows that the account was newly registered in February 2026, participated in only 7 markets, but has already realized a total profit of $16,427, with the largest single profit reaching $4,415. Core profit-making activities were concentrated within an extremely short time window. That is, the attacker used a total cost of possibly less than $10 in Gas to leverage over $16,000 in profit in a single day. And this is just one flagged address; the actual number of addresses involved in the attack and the total profit may be far greater.

For the victimized market makers, the losses are more difficult to quantify. A trader running a BTC 5-minute market bot on Reddit stated losses reached "thousands of dollars." The deeper damage lies in the opportunity cost of frequently forced order removal and the operational overhead of被迫调整做市策略.

A more棘手的问题 is that this vulnerability is an issue with the underlying mechanism design of Polymarket and cannot be fixed in the short term. As this attack method becomes public, similar attacks will become more common, further damaging Polymarket's already fragile liquidity.

Community Self-Help, Warnings, and the Platform's Silence

As of now, Polymarket官方 has not released a detailed statement or fix for this order attack. Some users have stated on social media that this bug was reported multiple times months ago but was consistently ignored. It is worth mentioning that Polymarket previously chose to refuse refunds when facing the "governance attack" (UMA Oracle vote manipulation) incident.

With no official action, the community began to find its own solutions. A community developer voluntarily created an open-source monitoring tool called "Nonce Guard." This tool can monitor order cancellation operations on the Polygon chain in real-time, build a blacklist of attacker addresses, and provide general warning signals for trading bots. However, this solution is essentially a monitoring-enhanced patch and cannot fundamentally solve this type of problem.

Compared to other arbitrage methods, the potential impact of this attack method could be more far-reaching.

For market makers, the hard-maintained orders can be batch-cleared without warning, completely destroying the stability and predictability of market-making strategies. This may directly shake their willingness to continue providing liquidity on Polymarket.

For users running automated trading bots, the成交 signals returned by the API are no longer trustworthy. Ordinary users trading may suffer significant losses due to instantly disappearing liquidity.

For the Polymarket platform itself, when market makers dare not place orders and bots dare not hedge, the order book depth will inevitably shrink, and this vicious cycle will further intensify.


Twitter:https://twitter.com/BitpushNewsCN

Bitpush TG Discussion Group:https://t.me/BitPushCommunity

Bitpush TG Subscription: https://t.me/bitpush

Original Link:https://www.bitpush.news/articles/7614683

Domande pertinenti

QWhat is the core mechanism behind the 'order attack' on Polymarket?

AThe attack exploits a time gap between off-chain order matching and on-chain settlement. An attacker places an order that gets matched off-chain, then immediately executes a high-Gas transaction to drain their wallet on-chain. When the settlement transaction is submitted, it fails due to insufficient funds, but the system incorrectly removes all the legitimate market maker orders that were part of that failed match from the order book.

QWhat are the two main profit paths for the attackers described in the article?

A1. Clearing competitors' orders to monopolize market making: After removing other market makers' orders, the attacker posts their own orders with a much wider bid-ask spread, forcing other traders to accept these unfavorable prices. 2. Hunting hedging bots: The attack causes automated trading bots to hedge based on a false 'filled' signal. When the original trade fails on-chain, the bot is left with an unhedged, risky position, which the attacker then exploits for profit.

QWhat is the estimated cost and profit for the attacker from a single marked address?

AThe cost per attack cycle is less than $0.10 in Gas fees on the Polygon network. A single marked attacker address, active for only about a day, recorded a total profit of $16,427, with the core profits being made within an extremely short time window.

QHow does the 'Ghost Fills' upgrade to the attack work?

AIn the 'Ghost Fills' method, instead of racing to drain their wallet, the attacker simply calls the 'cancel all orders' function on the contract after their order has been matched off-chain but before it settles on-chain. This instantly invalidates their own order, achieving the same effect of causing the match to fail and forcing the removal of the innocent market makers' orders.

QWhat has been the response from the Polymarket platform and the community to these attacks?

AAs of the article's writing, Polymarket's official platform had not released a detailed statement or a fix for the vulnerability. In response, the community has taken initiative, with a developer creating an open-source monitoring tool called 'Nonce Guard' to track order cancellations, build a blacklist of attacker addresses, and provide early warning signals for trading bots.

Letture associate

How Many Tokens Away Is Yang Zhilin from the 'Moon Chasing the Light'?

The article explores the intense competition between two leading Chinese AI companies, DeepSeek and Kimi (Moon Dark Side), and the mounting pressure on Yang Zhilin, the founder of Kimi. While DeepSeek re-emerged after 15 months of silence with its powerful V4 model—boasting 1.6 trillion parameters and low-cost, long-context capabilities—Kimi has been focusing on long-context processing and multi-agent systems with its K2.6 model. Yang faces a threefold challenge: technological rivalry, commercialization pressure, and investor expectations. Despite Kimi’s high valuation (reaching $18 billion), its revenue heavily relies on a single product with low paid conversion rates, while DeepSeek’s strategic silence and open-source influence have strengthened its market position and valuation prospects, now targeting over $20 billion. Both companies reflect broader trends in China’s AI ecosystem: Kimi aims for global influence through open-source contributions and agent-based advancements, while DeepSeek prioritizes foundational innovation and hardware independence, notably shifting to Huawei’s chips. Their competition is seen as vital for China’s AI progress, with the gap between top Chinese and U.S. models narrowing to just 2.7% on the Elo rating scale. Ultimately, the article argues that this rivalry, though anxiety-inducing for leaders like Zhilin, is essential for driving innovation and solidifying China’s role in the global AI landscape.

marsbit7 h fa

How Many Tokens Away Is Yang Zhilin from the 'Moon Chasing the Light'?

marsbit7 h fa

Trading

Spot
Futures

Articoli Popolari

Come comprare ORDER

Benvenuto in HTX.com! Abbiamo reso l'acquisto di Orderly (ORDER) semplice e conveniente. Segui la nostra guida passo passo per intraprendere il tuo viaggio nel mondo delle criptovalute.Step 1: Crea il tuo Account HTXUsa la tua email o numero di telefono per registrarti il tuo account gratuito su HTX. Vivi un'esperienza facile e sblocca tutte le funzionalità,Crea il mio accountStep 2: Vai in Acquista crypto e seleziona il tuo metodo di pagamentoCarta di credito/debito: utilizza la tua Visa o Mastercard per acquistare immediatamente OrderlyORDER.Bilancio: Usa i fondi dal bilancio del tuo account HTX per fare trading senza problemi.Terze parti: abbiamo aggiunto metodi di pagamento molto utilizzati come Google Pay e Apple Pay per maggiore comodità.P2P: Fai trading direttamente con altri utenti HTX.Over-the-Counter (OTC): Offriamo servizi su misura e tassi di cambio competitivi per i trader.Step 3: Conserva Orderly (ORDER)Dopo aver acquistato Orderly (ORDER), conserva nel tuo account HTX. In alternativa, puoi inviare tramite trasferimento blockchain o scambiare per altre criptovalute.Step 4: Scambia Orderly (ORDER)Scambia facilmente Orderly (ORDER) nel mercato spot di HTX. Accedi al tuo account, seleziona la tua coppia di trading, esegui le tue operazioni e monitora in tempo reale. Offriamo un'esperienza user-friendly sia per chi ha appena iniziato che per i trader più esperti.

220 Totale visualizzazioniPubblicato il 2024.12.10Aggiornato il 2025.03.21

Come comprare ORDER

Discussioni

Benvenuto nella Community HTX. Qui puoi rimanere informato sugli ultimi sviluppi della piattaforma e accedere ad approfondimenti esperti sul mercato. Le opinioni degli utenti sul prezzo di ORDER ORDER sono presentate come di seguito.

活动图片