// TODO: Add and explain all the attack vectors exists on this planet.
Serial No. | Attack Vectors | Description |
---|---|---|
1 | Reentrancy | |
2 | Oracle Manipulation | |
3 | Frontrunning | |
4 | Denial of Service | |
5 | Signature Replay | |
6 | Malicious Honeypot | |
7 | Unsafe Delegatecalls | |
8 | Sandwich Attacks | |
9 | Flash Loan Attacks | |
10 | Griefing | |
11 | Force Feeding | |
12 | Cross-Chain Bridge manipulation | |
13 | Insecure Randomness | |
14 | Accessing Private Data | |
15 | Phishing Through tx.origin | |
16 | Arithmetic Over/Under Flow | |
17 | Block timestamp Manipulation | |
18 | Unsafe external calls | |
19 | Unchecked return values | |
20 | Proxy Storage Collision | |
21 | Loops Gas Limit |