You mean, the same way that you've produced
your own *working* hash function?

You imply you can break it?

It was flawed and on a level of code that is often produced by high-school developers. MIT did the job for you:
https://medium.com/@neha/cryptographic-vulnerabilities-in-iota-9a6a9ddc4367.

We found that IOTAs custom hash function Curl is vulnerable to a well-known technique for breaking hash functions called differential cryptanalysis, which we then used to generate practical collisions. We used our technique to produce two payments in IOTA (they call them bundles) which are different, but hash to the same value, and thus have the same signature.
