Tuesday, January 27, 2026
Crypto NewsUsers told to revoke approvals after Matcha Meta SwapNet breach

Users told to revoke approvals after Matcha Meta SwapNet breach

Published:

Users told to revoke approvals after Matcha Meta SwapNet breach

Matcha Meta has urged users to revoke approvals to SwapNet’s router after a smart contract exploit drained up to $16.8 million on Coinbase’s Base network.

The company said the issue is tied to SwapNet, a third-party liquidity source integrated into the aggregator, and appears to impact users who disabled 0x One-Time Approvals and instead granted direct token allowances to SwapNet. Matcha Meta SwapNet exploit details and totals are still being verified.

What we know about the Matcha Meta SwapNet exploit

PeckShield reported that on Base the attacker swapped about $10.5M USDC for ~3,655 ETH and began bridging funds to Ethereum. Independent trackers and media posts place losses near $16.8M, though CertiK commentary in some feeds referenced a ~$13.3M figure, underscoring uncertainty as funds move across chains. Matcha Meta says it’s coordinating with SwapNet, which has disabled affected contracts, and is directing users to revoke approvals granted outside 0x’s One-Time Approval system.

Timeline of the Matcha Meta SwapNet exploit

Jan. 25–26, 2026.
Alerts surface on X; PeckShield cites ~$16.8M drained.

Jan. 26, 2026.
Matcha Meta advises revoking approvals to SwapNet router and notes contracts were disabled pending investigation.

Steps to revoke ERC-20 token allowances safely

Impact and who is affected

Users who opted out of One-Time Approvals on Matcha Meta and manually approved SwapNet’s router are most exposed. Because ERC-20 approvals persist until revoked, attackers can move any token amounts up to the allowance. Revoking approvals cuts off that permission even if your wallet is “disconnected” from a site.

How to reduce risk after the SwapNet incident

Revoke approvals to SwapNet’s router (address flagged in advisories) and any other third-party aggregators you don’t actively use.

Prefer One-Time Approvals when available to limit standing permissions.

Monitor addresses for new approvals and set a cadence (e.g., monthly) to prune old allowances.

Context & Analysis

 The case highlights a recurring DeFi risk: standing token approvals combined with router/aggregator contracts can become a single point of failure. Even audited projects face exposure when integrated contracts permit arbitrary calls or lack strict input validation. Standard user hygiene revoking stale approvals, limiting allowances, and preferring one-time permissions remains the most practical mitigation.

Overview of One-Time Approvals vs. unlimited allowances

Concluding Remarks

Matcha Meta has advised users to focus on personal security measures while its investigation with SwapNet continues. Estimated losses range between approximately $13.3 million and $16.8 million, highlighting the scale of the incident. Since the affected funds have already been bridged out, the chances of recovery remain unclear. Authorities and technical teams are still assessing the situation to determine possible next steps.

In the meantime, users are strongly encouraged to revoke all risky token approvals immediately to limit further exposure. Adopting least-privilege wallet practices, minimizing permissions, and regularly reviewing security settings can help reduce future risks and improve overall asset protection in decentralized platforms.

FAQs

Q: What happened in the Matcha Meta SwapNet exploit?

A : An attacker abused a SwapNet contract integrated with Matcha Meta and drained up to approximately $16.8 million, mostly on the Base network.

Q : Who is affected?

A : Primarily users who disabled 0x One-Time Approvals and granted direct token approvals to SwapNet’s router.

Q : How do I revoke approvals?

A : Use a trusted approval checker such as Revoke.cash or blockchain explorer tools, and submit an on-chain transaction to revoke the approvals.

Q : Is Matcha Meta’s core infrastructure compromised?

A : Current statements indicate that the exposure comes from SwapNet, not from Matcha Meta’s core systems.

Q : How much was stolen?

A : PeckShield estimates around $16.8M, while some other monitoring sources reported about $13.3M. Final numbers may change as investigations continue.

Q : Did the attacker bridge funds to Ethereum?

A: Yes. After swapping approximately $10.5M USDC for ~3,655 ETH on Base, the attacker started bridging the funds to Ethereum.

Q : Does revoking approvals stop future drains?

A : Yes. Revoking approvals removes the contract’s permission to spend your tokens, reducing the risk of future unauthorized transfers.

Facts

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Subscribe to our latest newsletter

Related articles

Subscribe

latest news