New Gold Protocol: The Flawed Fee Architecture Exploit (September 2025)
On September 17, 2025, NewGold Protocol (NGP), a DeFi project deployed on the BNB Smart Chain, suffered a catastrophic exploit resulting in the loss of approximately $2 million in user funds. The incident occurred shortly after launch, despite the protocol's branding around "DeFi 3.0" sustainability and its assertion that security was "non-negotiable."
Technical Overview
The NewGold Protocol functioned as an automated market maker (AMM) with a proprietary token (NGP) and a novel fee distribution mechanism. The protocol's core vulnerability stemmed from a dual failure: Oracle Manipulation and Defective Fee Accounting Logic.
Exploit Mechanism: The "Dead Wallet" Bypass & Fee Drain
The attacker orchestrated a sophisticated multi-step attack that exploited both administrative controls and internal accounting.
- Funded Preparation: The attacker acquired initial NGP tokens across multiple EOAs (Externally Owned Accounts), sourcing funds through Tornado Cash to obfuscate tracing.
- Collateral Leverage: The attacker took a massive BTCB flash loan via Moolah (a lending market) and used it as collateral to borrow vUSDT on Venus Protocol.
- The "Dead Wallet" Bypass:
- The protocol implemented a
maxBuyAmountUsdtrestriction to prevent large purchases that could manipulate price. - However, the protocol maintained a whitelist mechanism for specific addresses, including a "dead wallet" (burn address).
- The attacker executed swaps from BSC-USD to NGP on PancakeSwap but set the recipient address as the dead wallet.
- Because the dead wallet was whitelisted, the transaction bypassed the
maxBuyAmountUsdtrestriction entirely.
- The protocol implemented a
- The Flawed Fee Logic Drain:
- When tokens are sold in NGP, a 35% transaction fee is applied.
- The Vulnerability: Instead of deducting tokens from the seller's balance and transferring the remainder to the protocol, the contract directly reduced tokens from the liquidity pool's reserves after the swap.
- Critically, the contract called
sync()to update pool reserves after the fee deduction. - By combining the manipulated price (from the flash loan) with this "fee-on-reserves" logic, the attacker could drain the entire BSC-USD liquidity with a relatively small initial capital outlay.
- Liquidation & Exit: After depleting the pool, the attacker repaid all borrowed assets (flash loans and Venus debt) and exited with approximately $2 million in profit.
Why This Matters (The Fee-on-Reserves Anti-Pattern)
The NewGold hack illustrates a dangerous architectural anti-pattern that was thought to be obsolete:
- Accounting Integrity: The fee mechanism violated the fundamental accounting principle that fees should be paid by the transacting party, not the liquidity providers.
- Oracle Dependency: Relying exclusively on a single PancakeSwap pool for price feeds without any TWAP or external oracle aggregation made the protocol trivially manipulable via flash loans.
Mitigation Strategies
- Fee Accounting Integrity: Always calculate fees against the transfer amount from the user, not the destination balance or pool reserves. Use established patterns like
amountOut = amountIn * (1 - fee)before executing the transfer. - Multi-Source Oracles: Integrate at least two independent price feeds (for example, Chainlink + Pyth) and revert transactions if they deviate significantly from the internal pool price.
- Whitelist Auditing: Any bypass of global constraints (like
maxBuyAmountUsdt) must be strictly governed by a timelocked, multi-sig governance mechanism, not hardcoded addresses.
Conclusion
The $2M NewGold Protocol exploit is a reminder that novel fee mechanisms require the same rigorous auditing as novel financial products. The combination of a "dead wallet" bypass and a fee-on-reserves architecture created a deterministic drain that required minimal capital to execute. In 2026, protocols must rigorously test their accounting logic against flash loan scenarios before deployment.