blockchainmedium
[Blackbox] Web3_Lending
caplag
Task: DeFi lending platform on Anvil devnet with AMM, LendingVault, and FlashLoanProvider contracts. Solution: Reverse engineered EVM bytecode to extract flag from PUSH32 string literals; intended path was spot oracle price manipulation via flash loan attack.
$ ls tags/ techniques/
evm_bytecode_reverse_engineeringpush32_string_extractionspot_oracle_price_manipulationflash_loan_attackdefi_oracle_exploit
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]