🔄 Reentrancy Attacks: The $60M DAO Hack
Discover the vulnerability that nearly destroyed Ethereum in 2016
Your Progress
0 / 5 completed🚨 Understanding Reentrancy Attacks
Reentrancy is one of the most devastating smart contract vulnerabilities. It allowed the infamous 2016 DAO hack that drained $60 million and led to Ethereum's hard fork.
🎯 Interactive: Vulnerability Types Explorer
Explore the 4 main types of reentrancy vulnerabilities:
Withdrawal Reentrancy
CriticalMost common: attacker reenters during ETH withdrawal
What is a Reentrancy Attack?
A reentrancy attack occurs when a malicious contract calls back into the victim contract before the first invocation finishes. This allows the attacker to repeatedly execute functions while the contract's state is inconsistent.
The Basic Pattern:
Why It's So Dangerous
The DAO hack alone resulted in $60M stolen. Many DeFi protocols have lost millions to reentrancy.
Code can look correct at first glance. The vulnerability emerges from execution order, not syntax.
Bots scan for vulnerable contracts 24/7. Attacks happen within minutes of deployment.
Major hacks can affect network stability, gas prices, and user trust in the entire ecosystem.
What You'll Learn
⚠️ Critical Warning
Even experienced developers write vulnerable code. According to ConsenSys Diligence, reentrancy vulnerabilities appear in approximately 8% of all audited smart contracts.