blockchainmedium

[Blackbox] Web3_Lending

caplag

Task: DeFi lending platform on Anvil devnet with AMM, LendingVault, and FlashLoanProvider contracts. Solution: Reverse engineered EVM bytecode to extract flag from PUSH32 string literals; intended path was spot oracle price manipulation via flash loan attack.

$ ls tags/ techniques/
evm_bytecode_reverse_engineeringpush32_string_extractionspot_oracle_price_manipulationflash_loan_attackdefi_oracle_exploit

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]