Difference between revisions of "Exploits"
Jump to navigation
Jump to search
(added a page) |
m (added a link) |
||
Line 1: | Line 1: | ||
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]). | Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in [[Crypto Scams|crypto scams]]). | ||
Most exploits can be described as malicious, but not all exploits are malicious (see "Code is law"). | Most exploits can be described as malicious, but not all exploits are malicious (see: [[Code is law|"Code is law"]]). | ||
{| class="wikitable" | {| class="wikitable" | ||
|+ | |+ |
Revision as of 09:52, 29 April 2022
Exploit or a crypto exploit describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in crypto scams).
Most exploits can be described as malicious, but not all exploits are malicious (see: "Code is law").
Name | Description |
---|---|
Wallet drain | |
Contract drain | |