Exploit
hackprotocol exploit
A security failure that lets an attacker drain protocol funds — historically the dominant loss vector in DeFi.
Common exploit classes: re-entrancy, oracle manipulation, governance attack, signature replay, upgrade-key compromise, bridge consensus failure. Tracked by Rekt Database, DefiLlama Hacks, and Immunefi reports. StableLens models recent exploit history per protocol as a leading indicator (a protocol that just patched a critical bug is more — not less — risky in the immediate aftermath).
Related terms
- Oracle manipulationAn exploit class where an attacker moves the price an oracle reports, then triggers favourable liquidations / mints.
- Governance attackAn exploit that uses voting power (acquired or borrowed) to pass a proposal that drains a protocol.
- ReentrancyA vulnerability where an external call lets the caller re-enter the original function before state updates settle.
- Audit reportA security firm's written review of smart-contract code, classifying findings by severity and tracking issuer responses.