Security
Oracle Manipulation
Attacking price feed oracles to artificially manipulate smart contract decisions.
Last Updated
2026-03-29
Related Concepts
What is Oracle Manipulation?
Oracle manipulation is an exploit where an attacker artificially distorts a price feed to trick a smart contract into making incorrect decisions usually to borrow excess funds or trigger unfair liquidations.
How does Oracle Manipulation work?
- Attacker identifies a protocol using a single low-liquidity pool as its price oracle.
- Uses a flash loan to execute massive trades, moving the pool price artificially.
- The oracle reports the distorted price to the smart contract.
- The contract allows overborrowing or wrong liquidations based on the false price.
- Attacker unwinds the trade and repays the flash loan, keeping the profit.
Why does Oracle Manipulation matter?
It can drain an entire protocol's treasury in a single block. It highlights why robust, multi-source price feeds are critical for any DeFi protocol.
Key features of Oracle Manipulation
- Exploits single-source or illiquid price oracles
- Often uses flash loans for capital
- Executes within a single blockchain block
- Prevented by time-weighted average prices (TWAP) and decentralized oracle networks
Examples of Oracle Manipulation
The bZx protocol lost nearly $1 million in 2020 oracle manipulation attacks. Most major protocols now use 3+ independent price feeds from Chainlink to defend against this.
