Reentrancy Attacks

A reentrancy attack occurs when an external contract calls back into the calling contract before the first invocation of the function is finished. This exploit allows the attacker to manipulate the contract state, often repeatedly withdrawing funds or tokens before the contract can update the user balance.

It typically targets functions that perform external calls to untrusted contracts before updating internal variables. In the world of DeFi, this is a notorious vulnerability that has led to significant financial losses in various protocols.

Attackers leverage the asynchronous nature of blockchain execution to bypass standard balance checks. Once the contract sends ether or tokens to the attacker, the attacker's fallback function is triggered, which recursively calls the vulnerable function again.

Because the balance has not been reduced yet, the contract mistakenly approves the additional withdrawals. This cycle continues until the contract is drained or gas limits are reached.

Proper use of non-reentrant modifiers and adherence to the checks-effects-interactions pattern are the standard defenses against this exploit. It remains a primary focus for security auditors and developers building financial infrastructure.

MEV Protection
Sandwich Attacks
Sybil Attacks
Index Price
Economic Exploits
Flash Loan Liquidation
Transaction Ordering Attacks
Limited Profit

Glossary

G-Delta Attacks

Action ⎊ G-Delta attacks represent a manipulative trading practice targeting automated market makers (AMMs) prevalent in decentralized finance (DeFi).

Block Stuffing Attacks

Manipulation ⎊ Block Stuffing Attacks represent a form of network-level manipulation where an attacker floods the mempool or attempts to include a disproportionate number of low-value transactions within a block.

Denial-of-Service Attacks

Action ⎊ Denial-of-Service (DoS) attacks, particularly within cryptocurrency, options, and derivatives markets, represent a malicious attempt to disrupt service availability.

Cross-Chain Attacks

Exploit ⎊ Cross-chain attacks represent a class of vulnerabilities stemming from the interconnectedness of disparate blockchain networks, often targeting bridge protocols or cross-chain communication mechanisms.

Liquidity Provisioning Attacks

Exploit ⎊ Liquidity provisioning attacks represent a class of exploits targeting automated market makers (AMMs), specifically manipulating pool compositions to extract value.

Security Vulnerability

Exploit ⎊ A security vulnerability in cryptocurrency, options trading, and financial derivatives represents a weakness in system design, implementation, or operational procedures that can be leveraged to compromise confidentiality, integrity, or availability.

Social Attacks

Action ⎊ Social attacks, within financial markets, represent coordinated attempts to influence asset prices or investor behavior through deceptive or manipulative practices.

Flash Loans

Mechanism ⎊ Flash loans are uncollateralized loans in decentralized finance (DeFi) that must be borrowed and repaid within a single blockchain transaction.

Future Attacks

Action ⎊ Future Attacks, within cryptocurrency and derivatives, represent deliberate exploits targeting protocol vulnerabilities or market inefficiencies to generate illicit gains.

Gas Griefing Attacks

Gas ⎊ The escalating cost of transaction fees, often termed "gas," on blockchain networks like Ethereum presents a fertile ground for malicious actors employing griefing tactics.