Skip to content

Decentralized Finance threats, attack vectors, and mitigation strategies resource repo

License

Notifications You must be signed in to change notification settings

madhuakula/defi-sec

 
 

Repository files navigation

DeFi Threat Matrix

This work is inspired by attack.mitre.org. Please use attack for "normal" InfoSec/Dev/Sys security check-listing, this is ment to be specialized towards the unique issues brought about in blockchain/cryptocurrency applications (i.e. protocols).

Telegram Channels for Discussion

DeFi
DeFi Dev
DeFi Score
Flashfck

Tags

Should tags for "potential" attacks or attacks that have been successful be utilized, and if so how implemented

Repo Structure

  • csv .csv file containing the primary attack/potential attack planes
  • documents .md files containing various proposed "best practices", for example incident response plan is an example of how teams should best communicate with their userbase and is based off of existing regulatory requirements
  • LICENSE MIT License
  • README.md The file you are reading right meow.
  • src
    • entries README - Index of Entries .md files containing specific entries from the table below
Protocol / Interaction Based Blockchain Transaction Based Non-Blockchain Sources Blockchain Sources Contract Language
Market Attacks Economic Attack Off-Chain On-Chain Solidity
Front-Running Front-Running Price Feed Timestamp Dependence Integer Overflow and Underflow
Coordinated Attack Insufficient gas griefing Quote Stuffing Admin Key DoS with (Unexpected) revert
Liquidity Pocket Token Inflation Spoofing Timelock DoS with Block Gas Limit
Quote Stuffing Circulating Supply Attack Credential Access Lateral Movements Arithmetic Over/Under Flows
Wash Trading Gas Griefing (DoS) Reentrancy Multi-Sig Keys Forcibly Sending Ether to a Contract
Ramping The Market Network Congestion (uDoS) Privilege Escalation Miner Cartel Delegatecall
Cornering The Market Credential Access Finality Entropy Illusion
Churning Encryption Protections Short Address/Parameter Attack
Flash Loans Phishing Uninitialized Storage Pointers
Aggregated Transactions Unicode Exploits Floating Points and Numerical Precision
Bulge Bracket Transactions API Right-To-Left-Override control character (U+202E)
Layering DNS Attacks Delegatecall to Untrusted Callee
Spoofing Transaction Pool Transaction Pool Requirement Violation
Order Book Checksum Address Shadowing State Variables
Market Index Calculation Attack Transaction Order Dependence
Flash Crash Assert Violation
Repo Uninitialized Storage Pointer
Excessive Leverage Unprotected Ether Withdrawal
"Breaking the ""Buck""" Floating Pragma
"""Fake"" News" Outdated Compiler Version
Nested Bot Function Default Visibility
Audience of Bots
Arb. Exploit
Slippage Exploit
Safety Check Exploits
Circulating Supply Dump
Governance Cartel
"Flash ""Straddle"" "
Structuring

MIT License - Any rights or Trademarks are property of their respective owners. We Make No Claims on them whatsoever.

About

Decentralized Finance threats, attack vectors, and mitigation strategies resource repo

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 98.1%
  • Shell 1.9%