TL;DR
Coinbase lost roughly $300,000 in token fees after a configuration change caused its corporate DEX wallet to approve multiple tokens to 0x’s permissionless “swapper” contract, a tool designed for executing swaps, not holding allowances. Within minutes, an opportunistic MEV bot exploited the standing approvals, draining assets from the exchange’s fee-receiver account. Security researcher “Deebeez” first identified the incident, with Coinbase’s chief security officer confirming it as isolated and stressing no customer funds were involved.
Looks like @coinbase was recently drained of ~$300,000 after using @0xProject swapper incorrectly.
They approved all the tokens accrued as fees to their router, getting drained immediately by MEV bots
pic.twitter.com/yWNHl8nupg
— deebeez (@deeberiroz) August 13, 2025
0x’s swapper lets any user perform arbitrary calls, meaning that granting it token allowances is effectively an open invitation for asset movement. Coinbase received approvals for tokens like Amp, MyOneProtocol, DEXTools, and Swell Network. A waiting MEV bot quickly called the contract, transferring the approved balances away without exploiting any code vulnerability, purely through the risky combination of open permissions and on-chain composability.

After detection, Coinbase revoked the approvals and migrated the remaining assets to a new corporate wallet. The response limited losses to exchange-owned fee accruals and avoided impact on client funds. Industry observers noted that MEV opportunism has long been a hazard. In April, a bot lost $180,000 in Ether to another MEV agent, and in 2023, a rogue validator intercepted sandwich trades worth $25 million.
The episode underscores how permissionless design magnifies the need for airtight configuration. Risk can be reduced by isolating fee-receiver wallets from experimental routing, defaulting to deny-all approval policies with strict limits, simulating transactions before deployment, and rehearsing rapid-revoke protocols. While discussions about MEV mitigation, such as mempool encryption, continue, disciplined approval management remains the front line of defense.