Web3 Dictionary Logo
Web3 Dictionary
Contribute

Categories

AllBlockchainDappsDAOsDeFiNFTsRegulationSecuritySmart ContractsTokenomicsWalletsWeb3 GamingOthers
  1. Web3 Dictionary
  2. Security
  3. Exploit
Security

Exploit

A deliberate attack using code vulnerabilities to steal funds or break protocol functionality.

Last Updated

2026-03-19

Related Concepts

Smart Contract
Web3-Explorer Logo

Web3 Security

AD

Security frameworks, smart contract reviews, and compliance alignment to reduce risk and protect users.

Review Security Services

What is Exploit?

In Web3, an exploit is a targeted attack that leverages bugs, logical errors, or unforeseen vulnerabilities in a smart contract's code to steal assets or manipulate a protocol.

Unlike a simple glitch, an exploit is an intentional abuse of code to produce an outcome the developers did not intend.

How does Exploit work?

  1. An attacker (or security researcher) identifies a flaw in a protocol's code or economic logic.
  2. The attacker crafts a specific sequence of transactions designed to trigger the flaw.
  3. These transactions are broadcast to the network, often using high gas fees or flash loans to execute the attack quickly.
  4. The smart contract executes the malicious instructions, resulting in the drainage of funds or the breaking of the protocol's state.
  5. The stolen funds are often moved through "mixers" (like Tornado Cash) to hide the attacker's identity.

Why does Exploit matter?

Exploits are the single greatest threat to the DeFi ecosystem, often resulting in millions of dollars in losses. They highlight the principle that "code is law"if the code allows it, it can happen.

Key features of Exploit

  • Deliberate and malicious use of code flaws
  • Often targets complex DeFi logic (e.g., price oracles)
  • Result in significant financial loss or protocol failure
  • Irreversible once confirmed on the blockchain
  • Can be mitigated via audits and formal verification

Examples of Exploit

The "DAO Hack" in 2016 is one of the most famous exploits, using a "reentrancy" vulnerability to steal 3.6 million ETH.

More recently, "flash loan attacks" have been used to manipulate the price of tokens on DEXs to drain liquidity from lending protocols.

External References

  • DeFi Exploits Database
  • Understanding Protocol Exploits