Delegatecall Attack Vectors

Mechanism

Delegatecall attack vectors emerge from the EVM’s low-level message call instruction which executes code from an external contract within the context of the caller. This process preserves the sender, value, and storage layout of the original contract while altering the logical flow. Malicious actors leverage this architectural behavior to overwrite sensitive storage slots or execute unauthorized functions, effectively bypassing standard permissioning protocols.