Context Hijacking

Context hijacking occurs when an attacker manipulates the execution context of a contract to perform unauthorized actions. In the context of delegatecall, this means forcing a contract to execute code that treats the caller's storage as its own.

By carefully crafting the input data, an attacker can trick the target contract into modifying its own internal state in ways that benefit the attacker. This is a powerful technique for escalating privileges by corrupting the contract's own authorization variables.

It exploits the fundamental way the EVM manages execution contexts.

Delegatecall Injection
Backtesting Momentum Strategies
Malicious Implementation Contract
Seed Phrase Predictability
Governance Weight
Cross-Protocol Health Monitoring
Data Feed Latency Issues
Wallet Extended Public Key