Malicious transactions
Blockchain is software that is designed to process untrusted user input (i.e., transactions)
Injection attacks take advantage of flaws in input validation or processing to exploit the machine using them. Blockchain software can be vulnerable to injection as well
The impact of the malicious input can vary greatly. Some attacks enable VM breakouts, allowing a malicious actor to attack the underlying system
Last updated