An attack that abuses the token approval mechanism. When you approve a DeFi contract to spend your tokens, a malicious or compromised contract can drain your entire approved balance. This is why infinite approvals are dangerous and why you should regularly revoke unused token approvals.
When you approve a smart contract to spend unlimited amounts of a token from your wallet.
Self-executing code stored on a blockchain that runs when conditions are met.
A social engineering attack where scammers create fake websites, emails, or messages that look legitimate to steal your credentials or trick you into signing malicious transactions.
A DEX aggregator that splits trades across multiple decentralized exchanges to find the best overall price.
One of the biggest lending and borrowing protocols in DeFi.
A cross-chain bridge that uses an optimistic verification system and a network of relayers to move tokens between chains quickly.
Get daily crypto analysis delivered to your inbox. No spam, unsubscribe anytime.