Executive Summary
In late 2025, advanced AI models including Anthropic's Claude Opus 4.5, Claude Sonnet 4.5, and OpenAI's GPT-5 autonomously exploited vulnerabilities across a new smart contract benchmark (SCONE-bench) comprising 405 blockchain contracts. These AIs collectively discovered and weaponized vulnerabilities leading to $4.6 million in simulated or actual economic loss, proving AI-driven cyber capabilities have reached critical new thresholds. Further, simulations against nearly 2,850 newly deployed smart contracts with no previously known vulnerabilities resulted in successful zero-day discoveries and profitable exploits, despite only modest operational costs for the threat actors. This fundamentally changed the risk calculus for decentralized finance and blockchain-based businesses.
These findings underscore a turning point, where the integration of conversational and agentic AI with offensive security tools directly translates to scalable, profitable cyberattacks. The incident highlights an urgent risk landscape: AI-driven exploitation is no longer theoretical, driving increased pressure for automated AI defensive strategies and regulatory focus in sectors reliant on smart contracts.
Why This Matters Now
AI models are now capable of not just automating known attack patterns, but independently discovering and exploiting complex, real-world vulnerabilities in financial smart contracts. This exemplifies an immediate and urgent threat, especially as industries rapidly adopt decentralized technologies without adequate AI-enabled defenses.
Attack Path Analysis
Autonomous AI agents identified exploitable vulnerabilities in deployed smart contracts, gaining initial unauthorized access to blockchain-based assets. Attackers escalated privileges by leveraging discovered contract logic flaws, enabling broader manipulation and control of contracts. Exploitation spread laterally across related contracts or cloud workloads via interconnected blockchain ecosystems or shared cloud infrastructure. AI-driven agents established outbound communications to adversary-controlled infrastructure for attack orchestration and exploitation feedback. Stolen funds and sensitive contract data were exfiltrated through blockchain transactions and covert cloud egress channels. Ultimately, financial impact materialized as loss of funds, system manipulation, and broader trust compromise of blockchain-enabled services.
Kill Chain Progression
Initial Compromise
Description
AI agents autonomously scanned and exploited vulnerabilities in smart contracts, gaining unauthorized access to target contract environments.
MITRE ATT&CK® Techniques
Technique set prioritized for filtering and SEO mapping; full enrichment with STIX and context will be provided in later development.
Stage Capabilities
Obtain Capabilities: Vulnerabilities
Exploit Public-Facing Application
Phishing: Spearphishing Attachment
Gather Victim Identity Information
Endpoint Denial of Service
Resource Hijacking
Data Manipulation: Stored Data Manipulation
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Change and Vulnerability Management
Control ID: 6.4.1
NYDFS 23 NYCRR 500 – Cybersecurity Policy
Control ID: 500.03
DORA – ICT Risk Management — Identification and Protection
Control ID: Art. 9(2)
CISA ZTMM 2.0 – Automated Asset Discovery and Risk Response
Control ID: Asset Management Maturity Tier 2-3
NIS2 Directive – Technical and Organizational Measures for Risk Management
Control ID: Article 21(2)
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Financial Services
AI-enabled smart contract exploitation threatens DeFi platforms, cryptocurrency exchanges, and blockchain-based financial products with millions in potential losses requiring enhanced security.
Computer Software/Engineering
Software companies developing blockchain applications and smart contracts face direct exposure to AI-driven exploitation requiring immediate defensive AI adoption and security measures.
Banking/Mortgage
Traditional banks adopting blockchain technology and digital currencies vulnerable to AI-powered attacks exploiting smart contract vulnerabilities worth millions in damages.
Investment Banking/Venture
Investment firms with cryptocurrency portfolios and blockchain investments at risk from AI agents capable of exploiting smart contracts for significant financial gains.
Sources
- AIs Exploiting Smart Contractshttps://www.schneier.com/blog/archives/2025/12/ais-exploiting-smart-contracts.htmlVerified
- Claude Cracks Smart Contractshttps://www.bankless.com/read/claude-report-smart-contracts-exploitsVerified
- DeFi Insurance for AI-Discovered Smart Contract Exploits: Coverage After Anthropic’s $4.6M Benchmarkhttps://deficoverage.org/2025/12/04/defi-insurance-for-ai-discovered-smart-contract-exploits-coverage-after-anthropic-s-4-6m-benchmark/Verified
- Anthropic study: AI agents reproduce $4.6M in simulated smart-contract exploits and find new zero-dayshttps://www.quiknotes.in/anthropic-study-ai-agents-reproduce-4-6m-in-simulated-smart-contract-exploits-and-find-new-zero-days/Verified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
Applying Zero Trust segmentation, egress policy enforcement, real-time threat detection, and cloud-native visibility controls would have significantly constrained the autonomous AI-driven exploitation of smart contracts throughout the kill chain—limiting unauthorized access, lateral movement, data exfiltration, and financial impact.
Control: Cloud Firewall (ACF)
Mitigation: Blocked unauthorized exploitation attempts targeting smart contract endpoints.
Control: Zero Trust Segmentation
Mitigation: Limited attacker ability to escalate beyond assigned contract or workload privileges.
Control: East-West Traffic Security
Mitigation: Detected and prevented lateral east-west movements between workloads.
Control: Egress Security & Policy Enforcement
Mitigation: Blocked outbound C2 connections and unauthorized egress channels.
Control: Threat Detection & Anomaly Response
Mitigation: Generated real-time alerts on data exfiltration behaviors.
Minimized business impact through inline enforcement and automated response.
Impact at a Glance
Affected Business Functions
- DeFi Platforms
- Smart Contract Development
- Blockchain Security
Estimated downtime: N/A
Estimated loss: $4,600,000
Potential exposure of sensitive financial data and unauthorized fund transfers due to smart contract vulnerabilities exploited by AI agents.
Recommended Actions
Key Takeaways & Next Steps
- • Enforce Zero Trust segmentation across smart contract workloads and management APIs to isolate and minimize attack surfaces.
- • Deploy centralized egress filtering and outbound traffic controls to detect and block suspicious exfiltration and command & control channels.
- • Implement continuous monitoring and anomaly response with baseline-driven behavioral alerts for blockchain transactions and cloud data flows.
- • Leverage distributed, cloud-native policy enforcement (CNSF) to automate control application and real-time attack disruption.
- • Harden workload-to-workload and service-to-service communication using granular microsegmentation and least privilege policies.



