Friday, May 22, 2026
DIGESTWIRE
Contribute
CONTACT US
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Blog
  • Founders
No Result
View All Result
DIGESTWIRE
No Result
View All Result
Home Blockchain

Polymarket suffers live POL drain as team rules out feared contract exploit

by DigestWire member
May 22, 2026
in Blockchain, Crypto Market, Cryptocurrency
0
Polymarket suffers live POL drain as team rules out feared contract exploit
74
SHARES
1.2k
VIEWS
Share on FacebookShare on Twitter

Polymarket faced what many users interpreted as a possible hack on May 22 after public alerts described a rapid POL drain on the prediction market platform. Polymarket-linked accounts later said the incident was not a smart-contract exploit and did not affect user funds or market resolution.

The first wave of concern came from on-chain investigator ZachXBT and blockchain analytics firm Bubblemaps. ZachXBT said a Polymarket admin address appeared to have been compromised on Polygon, with more than $520,000 drained at the time of his Telegram alert.

Bubblemaps then warned that attackers were removing 5,000 POL roughly every 30 seconds and that about $600,000 had been stolen so far, while advising users to pause Polymarket activity.

Polymarket’s later explanation shifted the issue away from core-market failure and toward an internal operational security breach. Findings pointed to a private-key compromise of a wallet used for “internal top-up operations,” according to Polymarket Developers, rather than “contracts or core infrastructure.”

Polymarket software engineer Shantikiran Chanal similarly said, “User funds and market resolution are safe,” adding that the issue was linked to rewards payout reports.

That implies different risks. A contract or resolution failure would raise questions about whether markets could settle correctly or whether user positions were exposed. An internal funding-wallet compromise, while still serious, points instead to key management, refiller services, and operational controls around wallets that support the platform.

Crypto finds $64B product market fit in 2025 but reliance on centralized logins has created a critical security flaw
Related Reading

Crypto finds $64B product market fit in 2025 but reliance on centralized logins has created a critical security flaw

Mainstream adoption of prediction markets raises systemic trust challenges and highlights ambiguities in resolution mechanisms for crypto platforms.
Feb 11, 2026
·
Oluwapelumi Adejumo

Timeline showing ZachXBT and Bubblemaps alerts followed by Polymarket-linked statements that user funds, market resolution, and the CTF contract were safe.

The public alert moved faster than the private key compromise explanation

The timeline moved quickly. ZachXBT’s Telegram post at 08:22 UTC described a Polymarket admin address as apparently compromised on Polygon and identified the attacker address as 0x8F98075db5d6C620e8D420A8c516E2F2059d9B91.

The same post listed related and drained addresses, giving on-chain analysts a trail to follow.

Bubblemaps amplified the warning at 08:51 UTC, describing the situation as a Polymarket contract exploit, the kind of Polymarket exploit alert that would raise immediate concern about core infrastructure, and saying the attacker was removing 5,000 POL every 30 seconds.

On-chain data show why the warning drew attention. A PolygonScan transaction at 09:01:19 UTC shows 5,000 POL moving into a Polymarket-labeled UMA CTF Adapter Admin address.

Seven seconds later, another PolygonScan transaction shows 4,999.994 POL moving from that labeled admin address to the labeled attacker address. The attacker address page is tagged by PolygonScan as “Polymarket Adapter Exploiter 1” and shows repeated transfers around the alert window.

That transaction pair supports the visible drain pattern that triggered the public alarm and gives a concrete example of the kind of transfer flow that Polymarket team members later described as involving an internal refiller, while leaving root cause to the team’s statements.

Question Initial alert Polymarket-linked explanation
What was happening? Bubblemaps warned that 5,000 POL was being removed roughly every 30 seconds. Team statements linked the reports to rewards payout or internal top-up activity.
Was it a contract exploit? Bubblemaps initially described it as a Polymarket contract exploit. Polymarket-linked accounts said findings pointed away from contracts or core infrastructure.
Were user funds affected? The first alert advised users to pause activity. Shantikiran Chanal and Polymarket Developers said user funds and market resolution were safe.
What remains unresolved? The live loss estimate was about $600,000 at Bubblemaps’ alert. The final loss amount, full affected-address set, and remediation details were still unsettled.

Polymarket’s stablecoin launch looks bearish for USDC, but the real shift runs deeper
Related Reading

Polymarket’s stablecoin launch looks bearish for USDC, but the real shift runs deeper

Polymarket’s new token may not cut USDC demand, but it could make that demand harder to see and easier to misread.
Apr 7, 2026
·
Andjela Radmilac

Detective interrogates Polymarket contracts after POL drain alert

Team statements pointed to a Polymarket private key compromise

The clearest official wording came from the Polymarket Developers account, which framed the incident as a Polymarket private key compromise involving a wallet used for internal top-up operations.

That phrasing moves the incident out of the category of a direct smart-contract vulnerability and into a more operational question: who controlled the key, how it was exposed, and why the affected process kept sending POL into an address that could be drained.

Chanal’s statement used similar language, saying the reports were linked to rewards payout and that findings pointed to a private-key compromise of a wallet used for internal operations. In replies to users, Chanal said wallets were “completely safe” and said the team was investigating backend systems and secrets while rotating keys.

Mustafa, another Polymarket-linked source, gave the most direct explanation of the contract distinction. He said “The CTF contract is not exploited,” adding that the issue involved an internal ops address used by a service that checks and refills balances every few seconds.

He also said all user funds were safe and that the address was being rotated.

Polymarket’s own documentation helps explain the stakes behind that distinction. The platform says markets use UMA for resolution and that winning positions are redeemed after resolution through CTF-related mechanics.

Polymarket faces major credibility crisis after whales forced a “YES” UFO vote without evidence
Related Reading

Polymarket faces major credibility crisis after whales forced a “YES” UFO vote without evidence

Late-night traders bought odds at 99 cents just before a token-weighted vote overruled the public consensus, exposing a massive flaw in "truth" markets.
Dec 10, 2025
·
Liam 'Akiba' Wright

Its CTF documentation describes outcome tokens for prediction markets and notes that Yes/No pairs are fully collateralized. Against that background, a direct failure in CTF or resolution infrastructure would raise different questions from a compromised wallet used for rewards or internal top-ups.

The known team statements place the issue outside the core market-resolution infrastructure. They leave the operational-security question open.

Flow diagram separating the internal top-up and refiller path from Polymarket core market infrastructure, with open remediation questions listed.

Private keys are the authority layer for blockchain wallets, and a compromised internal key can still move funds, trigger public panic, and expose weaknesses in monitoring or automated funding flows even when users’ trading balances and market settlement are not the target.

The next update needs to settle the loss and remediation details

For users right now, Polymarket’s team says the incident was limited to internal operations, meaning Polymarket user funds, core contracts, and market-resolution processes were outside the affected path.

The remaining question is how much was ultimately lost and what changed after the team discovered the compromised key.

ZachXBT’s first available figure was more than $520,000 drained. Bubblemaps later said about $600,000 had been stolen at the time of its alert.

On-chain pages show a representative transfer trail, but the current public record leaves the final audited loss amount, full set of affected addresses, and recovery status unsettled.

The operational follow-up is just as important. Polymarket-linked statements said the affected address was being rotated and that the team was investigating backend systems and secrets.

That leaves several live questions: whether rotation has been completed, whether any connected refiller-service credentials were exposed, whether the compromised wallet had permissions beyond the observed transfers, and whether the platform will publish an incident report explaining the failure.

For traders, the practical takeaway is that the initial public wording appears to have overstated the contract-exploit angle based on the later Polymarket team statements. A live drain of internal funds remains a security incident, especially for a platform whose users rely on clear separation between operational wallets, rewards systems, and market infrastructure.

Until Polymarket issues a final update, the team has told users their funds and market resolution are safe, while the public chain record shows a rapid POL drain from Polymarket-labeled infrastructure.

The next disclosure needs to state the final loss, confirm the address rotation, and explain what changed after a Polymarket private key compromise turned an internal wallet into the center of a live-drain alarm.

The post Polymarket suffers live POL drain as team rules out feared contract exploit appeared first on CryptoSlate.

Read Entire Article
Tags: BlockchainCoin SurgesCryptoslate
Share30Tweet19
Next Post
SUI Price Reclaims Key Resistance—Can Bulls Trigger a V-Shaped Recovery Toward $1.50?

SUI Price Reclaims Key Resistance—Can Bulls Trigger a V-Shaped Recovery Toward $1.50?

Polymarket And Kalshi Are Now Under Congressional Investigation — The Evidence That Triggered It Is Hard To Dismiss

Polymarket And Kalshi Are Now Under Congressional Investigation — The Evidence That Triggered It Is Hard To Dismiss

Billionaire Mark Cuban Reveals He Sold Most Of His Bitcoin: Here’s Why

Billionaire Mark Cuban Reveals He Sold Most Of His Bitcoin: Here’s Why

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

No Result
View All Result
Coins MarketCap Live Updates Coins MarketCap Live Updates Coins MarketCap Live Updates
ADVERTISEMENT

Highlights

Brooke Shields Insists She Never Slept With JFK Jr. During ’80s Fling

Tom Hardy Axed From ‘MobLand’ After Clashing With Producers: Report

Eva Longoria, Lily James, Robin Thicke and More!

Tom Hardy Out of ‘Mobland’ Season 3 After Season 2 Wraps Production

Brian Newman, Frequent Lady Gaga Collaborator, Releases New Single ‘The Boulevard of Broken Dreams’

Tom Sturridge on Ira Sachs’ ‘The Man I Love,’ Finding the ‘Physical Language’ of His On-Screen Relationship With Rami Malek and Joining Mia Hansen-Løve’s Next Film

Trending

Ponting: ‘We only have ourselves to blame for where we are’
Cricket

Ponting: ‘We only have ourselves to blame for where we are’

by DigestWire member
May 22, 2026
0

PBKS' head coach is wary of a dangerous LSG side who have nothing to lose

PBKS meet LSG with playoffs hopes hanging by a thread

PBKS meet LSG with playoffs hopes hanging by a thread

May 22, 2026
Raghuvanshi ruled out of IPL 2026 after suffering concussion and finger fracture

Raghuvanshi ruled out of IPL 2026 after suffering concussion and finger fracture

May 22, 2026
Brooke Shields Insists She Never Slept With JFK Jr. During ’80s Fling

Brooke Shields Insists She Never Slept With JFK Jr. During ’80s Fling

May 22, 2026
Tom Hardy Axed From ‘MobLand’ After Clashing With Producers: Report

Tom Hardy Axed From ‘MobLand’ After Clashing With Producers: Report

May 22, 2026
DIGEST WIRE

DigestWire is an automated news feed that utilizes AI technology to gather information from sources with varying perspectives. This allows users to gain a comprehensive understanding of different arguments and make informed decisions. DigestWire is dedicated to serving the public interest and upholding democratic values.

Privacy Policy     Terms and Conditions

Recent News

  • Ponting: ‘We only have ourselves to blame for where we are’ May 22, 2026
  • PBKS meet LSG with playoffs hopes hanging by a thread May 22, 2026
  • Raghuvanshi ruled out of IPL 2026 after suffering concussion and finger fracture May 22, 2026

Categories

  • Blockchain
  • Blog
  • Breaking News
  • Business
  • Cricket
  • Crypto Market
  • Cryptocurrency
  • Defense
  • Entertainment
  • Football
  • Founders
  • Health Care
  • Opinion
  • Politics
  • Sports
  • Strange
  • Technology
  • UK News
  • Uncategorized
  • US News
  • World

© 2020-23 Digest Wire. All rights belong to their respective owners.

No Result
View All Result
  • Home
  • World
  • UK
  • US
  • Breaking News
  • Technology
  • Entertainment
  • Health Care
  • Business
  • Sports
    • Sports
    • Cricket
    • Football
  • Defense
  • Crypto
    • Crypto News
    • Crypto Calculator
    • Blockchain
    • Coins Marketcap
    • Top Gainers and Loser of the day
    • Crypto Exchanges
  • Politics
  • Opinion
  • Strange
  • Blog
  • Founders
  • Contribute!

© 2024 Digest Wire - All right reserved.

Privacy Policy   Terms and Conditions

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.