Attack Vectors
Given that interoperability protocols and bridges have been targeted by sophisticated black-hat hackers (including state-sponsored actors), it is imperative that we have an understanding of the most common ways these protocols have been targeted.
After going through the most recent exploits and vulnerabilities, we've grouped the attack vectors into three large buckets:
Key compromise via server exploits and basic phishing attacks
Economic attacks, including Sybil attacks on validator sets
Smart contract bugs and code quality vulnerabilities
Each of these considerations warrants its own discussion, and will be covered in the following sections. We will also discuss how the Nomad system architecture and the Nomad core team operating processes helps reduce risks on each of these fronts.
Last updated