● Category
Web3 & Blockchain
28 entries
- web3№ 106
Blockchain Security
The discipline of protecting distributed ledgers, their consensus mechanisms, smart contracts, and surrounding infrastructure from compromise, fraud, and theft.
- web3№ 1056
Smart Contract Security
The practice of designing, reviewing, and operating on-chain programs so they cannot be exploited to steal funds, freeze logic, or violate intended business rules.
- web3№ 1055
Smart Contract Audit
An independent security review of smart-contract source code, deployment configuration, and economic design to find vulnerabilities before launch or upgrade.
- web3№ 910
Reentrancy Attack
A smart-contract exploit where an external call lets the attacker re-enter the calling function before its state is updated, draining funds in a recursive loop.
- web3№ 424
Flash Loan Attack
A DeFi exploit that borrows a massive uncollateralised flash loan within one transaction to manipulate prices or governance and steal funds before the loan is repaid.
- web3№ 952
Rug Pull
An exit scam in which the developers of a crypto token, NFT collection, or DeFi protocol drain liquidity or treasury funds and disappear, leaving holders with worthless assets.
- web3№ 003
51% Attack
An attack where a single entity controls a majority of a blockchain's mining hash rate or staking power and uses it to rewrite history, double-spend, or censor transactions.
- web3№ 435
Front-Running (Blockchain)
On-chain trade abuse where an actor sees a pending transaction in the mempool and submits their own transaction first to profit from the predictable price impact.
- web3№ 675
MEV (Maximal Extractable Value)
The profit that block builders, validators, or searchers can extract by reordering, inserting, or censoring transactions within the blocks they produce.
- web3№ 965
Sandwich Attack
A form of MEV in which an attacker places a buy order before a victim's pending swap and a sell order immediately after, profiting from the artificial price move they induce.
- web3№ 765
Oracle Manipulation
An attack that distorts the price or data feed used by a smart contract so the contract makes wildly wrong decisions about lending, liquidations, or settlement.
- web3№ 1221
Wallet Drainer
Malicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs.
- web3№ 1003
Seed Phrase
A human-readable list of 12 or 24 words (typically a BIP-39 mnemonic) that encodes the master secret from which all keys of a crypto wallet are derived.
- web3№ 198
Cold Wallet
A crypto wallet whose private keys are generated and stored on a device that is kept offline, so they are not exposed to remote network attackers.
- web3№ 491
Hot Wallet
A crypto wallet whose private keys reside on an internet-connected device, trading lower security for low-friction signing of frequent transactions.
- web3№ 243
Cryptocurrency Mixer / Tumbler
A cryptocurrency mixer (or tumbler) pools and shuffles deposits from many users so that on-chain links between source and destination addresses are obscured.
- web3№ 365
Dust Attack
A dust attack sends tiny amounts of cryptocurrency to many wallets so that, when the recipients later spend the dust, on-chain analysts can cluster and de-anonymize the addresses.
- web3№ 816
Permit2 Phishing
Permit2 phishing tricks an Ethereum user into signing a Uniswap Permit2 off-chain message that grants an attacker the right to transfer the victim's ERC-20 tokens.
- web3№ 016
Address Poisoning
Address poisoning seeds a victim's transaction history with attacker-controlled lookalike addresses so they later copy-paste the wrong one and send funds to the attacker.
- web3№ 181
Clipboard Hijacker
A clipboard hijacker (crypto clipper) is malware that watches the OS clipboard and silently substitutes a victim's copied cryptocurrency address with one controlled by the attacker.
- web3№ 464
Hardware Wallet
A dedicated physical device that stores cryptocurrency private keys in a tamper-resistant secure element and signs transactions offline.
- web3№ 613
Ledger Wallet
A hardware wallet line by French firm Ledger SAS that stores cryptocurrency keys inside a certified secure-element chip.
- web3№ 1170
Trezor Wallet
An open-source hardware wallet line by SatoshiLabs that stores cryptocurrency seeds offline and signs transactions through a built-in screen and buttons.
- web3№ 906
Recovery Phrase
A list of 12 or 24 words generated under the BIP-39 standard that encodes the master seed of a cryptocurrency wallet and can restore all derived keys.
- web3№ 709
Multisig Wallet
A cryptocurrency wallet that requires m-of-n signatures from independent keys to authorise a transaction, removing single-key compromise as a fatal failure.
- web3№ 1268
ZK-Rollup
A Layer 2 scaling technique that batches transactions off-chain and posts a succinct zero-knowledge proof of their validity to the underlying Layer 1 blockchain.
- web3№ 609
Layer 2
A scaling network that processes transactions off-chain while inheriting security from a base Layer 1 blockchain such as Ethereum or Bitcoin.
- web3№ 300
DeFi
Decentralized Finance: financial protocols built from smart contracts on public blockchains that offer lending, trading, and other services without traditional intermediaries.