Difference between revisions of "Exploits"

From DefiLlama
Jump to navigation Jump to search
m (added couple of exploit types and resources)
m
 
Line 22: Line 22:
https://rekt.news/leaderboard/ (a leaderboard of biggest hacks/exploits in crypto space)
https://rekt.news/leaderboard/ (a leaderboard of biggest hacks/exploits in crypto space)


https://twitter.com/zachxbt  
https://twitter.com/zachxbt (on-chain detective, exposing some of the hackers and scammers)


[[Category:Exploit]]
[[Category:Exploit]]

Latest revision as of 10:13, 29 April 2022

Exploit or a crypto exploit/hack describes a way for a 3rd party to extract value from a protocol or person using more technical means (in contrast to social engineering in crypto scams).

Most exploits can be described as malicious, but not all exploits are malicious (see: "Code is law").

Most common types of exploits
Name Description
Wallet drain Victim is socially engineered into approving his wallet funds to be spent by a contract, which then drains the approved tokens from the victims wallet
Contract drain Usually caused by vulnerability in the contracts code, which allows the attacker to drain funds from the contracts address (often leveraging flash loans)
etc

Resources

To explore history and details on hacks and exploits:

https://rekt.news/leaderboard/ (a leaderboard of biggest hacks/exploits in crypto space)

https://twitter.com/zachxbt (on-chain detective, exposing some of the hackers and scammers)