Attack Vectors
Last updated
Last updated
Given that interoperability protocols and bridges have been targeted by sophisticated black-hat hackers (including state-sponsored actors), it is imperative that we have an understanding of the most common ways these protocols have been targeted.
After going through the most recent exploits and vulnerabilities, we've grouped the attack vectors into three large buckets:
via server exploits and basic phishing attacks
, including on validator sets
and code quality vulnerabilities
Each of these considerations warrants its own discussion, and will be covered in the following sections. We will also discuss how the Nomad system architecture and the Nomad core team operating processes helps reduce risks on each of these fronts.