# Overview

Guardrail protects protocols across DeFi. Here's how different protocol types use our monitoring.

## By Protocol Type

* [Lending & Borrowing](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/use-cases/lending/README.md)
* [DEXs & AMMs](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/use-cases/dex/README.md)
* [Bridges & Cross-Chain](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/use-cases/bridges/README.md)
* [Governance & DAOs](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/use-cases/governance/README.md)

## Common Attack Vectors We Detect

| Attack Type               | Description                                                         | Example Incident       |
| ------------------------- | ------------------------------------------------------------------- | ---------------------- |
| Flash Loan Attacks        | Borrowed funds used to manipulate state within a single transaction | Euler 2023 ($197M)     |
| Price Oracle Manipulation | Exploiting price feeds to borrow/mint more than collateral allows   | Polter Finance ($8.7M) |
| Reentrancy                | Functions called recursively before state updates complete          | Penpie ($27M)          |
| Governance Exploits       | Compromised signers or malicious proposals                          | Radiant Capital ($50M) |
| Uninitialized Proxies     | Upgrade contracts deployed without proper initialization            | Ronin Bridge ($12M)    |
| Private Key Compromise    | Stolen keys used to drain funds or change ownership                 | WazirX ($230M)         |

***
