Malicious Transaction

After the identification of a vulnerability which can be exploited by a transaction the attackers send a specific transaction to the network to e.g. manipulate a price or drain a bridge.
Sub techniques (2)
IDName
RD05 Smart contract exploitation
RD06 Bot development
IDMitigationDescription
M01AuditDAO projects should commission audits before the go live of their smart contracts.
M02Check smart contract Investors with an affinity for technology should check the lines of code of the smart contract on their own before investing.
M03Check token contract Investors should check the contract address of a token before buying it on a decentralized exchange to avoid buying a fake one.