
The recovery was aided by the SEAL (Security Alliance), highlighting the power of collaborative Web3 defense.
In the complex world of zero-knowledge (ZK) proofs, a single missing line of code can be catastrophic. Foom Cash, a decentralized lottery protocol, learned this the hard way on Monday after a “fatal” deployment error led to a $2.26 million loss. The vulnerability was technical and specific: a missing step in the “Phase 2 trusted setup” for the Groth16 verifier. Essentially, the developers skipped a circuit-specific contribution, meaning the protocol’s security parameters (gamma and delta) remained at their default, unrandomized values.
This oversight was a “placeholder” for disaster. An attacker was able to exploit this lack of randomness to trick the protocol into accepting forged proofs, effectively draining the treasury.
It’s a classic case of Web3 “deployment fatigue,” where high-speed launches overlook the nuances of ZK-snark mathematics. For Foom Cash, which prides itself on anonymity and advanced cryptography, the irony of falling to a default-setting error was not lost on the community.
Thankfully for Foom Cash users, the story didn’t end with a “rug pull.” A pseudonymous white hat hacker named Duha identified the vulnerability in real-time and acted to secure $1.84 million (81% of the stolen funds) on the Base network.
Working alongside the crypto security platform Decurity, which managed the recovery on Ethereum, the team successfully clawed back the majority of the assets. In a show of good faith, Foom Cash awarded Duha a $320,000 bounty and Decurity a $100,000 fee, proving that “honoring the bug bounty” is the best way to keep ethical researchers on your side.
This incident marks another win for the SEAL (Security Alliance), an initiative started by Paradigm’s Samczsun. Since its inception, SEAL has handled over 900 investigations, providing a “911 service” for DeFi protocols.
As hackers become more sophisticated — like those who recently hit WazirX for $230 million — the “Trillion Dollar Security” initiative, a partnership between the Ethereum Foundation and SEAL, is becoming the industry’s most vital line of defense. In 2026, it seems the best security isn’t just a better audit; it’s a faster white hat.
Deployment errors are human, but the recovery of $1.8M shows that the “Security Alliance” is finally leveling the playing field against malicious exploiters.
What caused the Foom Cash exploit?
A failure to randomize security parameters in the Groth16 verifier during the deployment setup.
How much money was recovered?
Thanks to white hat “Duha,” $1.84 million (roughly 81% of the total stolen) was safely returned to the protocol.
What is the SEAL Security Alliance?
A group of ethical hackers and researchers who provide emergency response for Web3 security incidents.

