Skip to content

Title of the hack

  • Project: Name of the project
  • Exploit_type: Type of issue (like Reentrancy, Access Control)
  • Loss: How much money or tokens were lost
  • Entry_point: The function or contract where the bug was
  • Exploit_vector: How the attacker used the bug
  • Severity: Critical, High, Medium or Low – based on how bad the bug was
  • Attack_steps: ["Step-by-step actions taken by the attacker"]
  • Impact: What was stolen or affected
  • Exploitability: How easy it was to exploit: High, Medium, or Low"
  • Root_cause: What mistake in the code allowed this to happen
  • Resource:Link