Explore the World's Best Ideas
Join today and uncover 100+ curated journeys from 50+ topics. Unlock access to our mobile app with extensive features.
OG Scam That Still Hits Hard
Let’s be real: Ethereum changed the game.
It didn’t just say, “Yo, let’s move crypto.”
It said, “What if you could build apps on the blockchain?”
And boom—smart contracts. dApps. The Ethereum Virtual Machine. All that good stuff.
BUT…
With great code comes great responsibility—and unfortunately, some super old bugs are still haunting us.
Enter: Reentrancy Attacks.
They’re like the ex that just won’t stop calling.
1
0 reads
Imagine you’re sending money to someone, and while you’re doing that, they sneak back in and say, “Actually, send me that money again.
And again. And again…” until your wallet's dry and you're wondering why you ever trusted them.
That’s reentrancy.
It’s when a hacker abuses a smart contract’s flow and repeatedly calls back into a withdrawal function before the balance updates.
And yeah—it’s as bad as it sounds.
“Aren’t We Past That?”
Not really.
1
0 reads
Some folks think these attacks are ancient history.
But here’s the tea: 4 out of 24 major Web3 hacks in the first half of 2023 were reentrancy-based.
Clearly, this vampire of a bug still bites.
Flashback: The DAO Hack (aka Web3’s First Public L)
Back in 2016, the DAO got wrecked—like, $60 million gone wrecked—because of a reentrancy vulnerability.
And because it was the first major DAO ever, it was a really bad look for blockchain.
Trust got shattered.
Headlines screamed “Crypto is the Wild West.”
And honestly?
That reputation still lingers.
1
0 reads
okay but how does it actually work?
Let’s break it down:
1. Step 1: Hacker contract (let’s call it A) deposits a lil’ ETH into victim contract B.
2. Step 2: A asks B for a withdrawal.
3. Step 3: B starts the withdrawal but before it can update A’s balance…
4. Step 4: A jumps back in (re-enters) and says, “Hey, give me more ETH.”
5. Step 5: Rinse and repeat until B is broke.
This works because B doesn’t update balances before sending funds, which is like letting someone take money out of an ATM before checking their actual account balance. Classic mistake.
1
0 reads
Analogy Time
Picture this: a small-town bank doesn’t update withdrawal balances until the end of the day.
Along comes Abraham, who figures this out. He withdraws $5000, then again, and again—before the bank notices anything’s off.
By nightfall, the vault’s empty.
That’s a reentrancy attack IRL.
Dumb mistake.
Huge loss.
1
0 reads
Flavors of Reentrancy (Yup, It’s Not Just One Kind)
1. Single-function Reentrancy:
Same function gets re-entered. Classic and easy to exploit.
2. Cross-function Reentrancy:
One function messes with another's shared state. Harder to detect. Sneakier.
3. Cross-contract Reentrancy:
Multiple contracts share variables. Hacker jumps from one to another mid-call. Ultimate tag-team scam.
1
1 read
So… Should You Care?
YES.
Smart contracts are running billion-dollar protocols now.
a bug like reentrancy still sneaks in, it could wipe out entire ecosystems.
If you're coding smart contracts or even just using dApps, this matters.
Security ain’t just for devs—it’s for everyone.
Bottom Line:
Reentrancy attacks may be old, but they’re not dead.
Know them.
Spot them.
Fix them.
Or watch your protocol end up in a “Top 10 Worst Crypto Hacks” YouTube video.
1
0 reads
IDEAS CURATED BY
CURATOR'S NOTE
It’s not a hack. It’s a dance. One step in, two steps out—with your money.
“
Similar ideas
4 ideas
Attack on Titan
Hajime Isayama
5 ideas
Attack on Titan 25
Hajime Isayama
1 idea
Attack each day...
quotefancy.com
Read & Learn
20x Faster
without
deepstash
with
deepstash
with
deepstash
Personalized microlearning
—
100+ Learning Journeys
—
Access to 200,000+ ideas
—
Access to the mobile app
—
Unlimited idea saving
—
—
Unlimited history
—
—
Unlimited listening to ideas
—
—
Downloading & offline access
—
—
Supercharge your mind with one idea per day
Enter your email and spend 1 minute every day to learn something new.
I agree to receive email updates