SchunckMarch 27, 2023Initial AccessMalicious Transaction After the identification of a vulnerability which can be exploited by a transaction the attackers send a specific transaction to the network to e.g. manipulate a price or drain a bridge. Sub techniques (2) IDNameRD05 Smart contract exploitationRD06 Bot development MitigationsIDMitigationDescriptionM01AuditDAO projects should commission audits before the go live of their smart contracts. M02Check smart contract Investors with an affinity for technology should check the lines of code of the smart contract on their own before investing. M03Check token contract Investors should check the contract address of a token before buying it on a decentralized exchange to avoid buying a fake one.