A successful attack that abuses a vulnerability to steal or manipulate funds.
Exploits can target smart contracts, bridges, or infrastructure dependencies.
Exploit used in article cross-linking coming soon. This term will show guides and comparisons where it appears.