Title of the hack
- Project: Name of the project
- Exploit_type: Type of issue (like Reentrancy, Access Control)
- Loss: How much money or tokens were lost
- Entry_point: The function or contract where the bug was
- Exploit_vector: How the attacker used the bug
- Severity: Critical, High, Medium or Low – based on how bad the bug was
- Attack_steps: ["Step-by-step actions taken by the attacker"]
- Impact: What was stolen or affected
- Exploitability: How easy it was to exploit: High, Medium, or Low"
- Root_cause: What mistake in the code allowed this to happen
- Resource:Link