Overview

Guardrail protects protocols across DeFi. Here's how different protocol types use our monitoring.

By Protocol Type

Common Attack Vectors We Detect

Attack Type
Description
Example Incident

Flash Loan Attacks

Borrowed funds used to manipulate state within a single transaction

Euler 2023 ($197M)

Price Oracle Manipulation

Exploiting price feeds to borrow/mint more than collateral allows

Polter Finance ($8.7M)

Reentrancy

Functions called recursively before state updates complete

Penpie ($27M)

Governance Exploits

Compromised signers or malicious proposals

Radiant Capital ($50M)

Uninitialized Proxies

Upgrade contracts deployed without proper initialization

Ronin Bridge ($12M)

Private Key Compromise

Stolen keys used to drain funds or change ownership

WazirX ($230M)

View full guard catalog →arrow-up-right


Last updated