Technical illustration DeFi lightning loan attack and defense: take the bZx incident as an example

Technical illustration DeFi lightning loan attack and defense: take the bZx incident as an example

Loading

Yudan and Kong, senior security engineers of SlowMist Technology, believe that the DeFi security situation is severe, and security audits are currently the most cost-effective way to protect project security.

Original Title: “DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues”
Written by: Yudan and Kong, SlowMist Senior Security Engineer

This Hacking Time includes closed-door training on blockchain security and a keynote speech on blockchain security. The SlowMist security team will share with industry experts. It focuses on the construction of security system, the key points of offensive and defense from the perspective of underground hackers, and the security of digital assets. To communicate.

The following topics are selected from the “DeFi Flash Loan Attack and Defense Battle” brought by SlowMist Technology senior security engineer yudan &Kong. Based on the two earliest flash loan attack cases of bZx, yudan and Kong introduced the basic attack form of flash loan-proxy Currency price manipulation, detailed description of the defense plan of lightning loan based on price manipulation and how to use lightning loan to find another way to make profits by manipulating the unit price of LP Token when its price cannot be manipulated. I also reviewed the 2020 DeFi hacking event with everyone through the SlowMist Hacked Archive. Yudan and Kong believe that the DeFi security situation is severe, and security audits are currently the most cost-effective way to protect project security. In the current DeFi dark forest, we walk in Linyuan and need to walk on thin ice.

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

DeFi Lightning Loan Attack and Defense Battle | Hacking Time Issues

More topics PPT