Glossary Terms
Browse our comprehensive Web3 security glossary

Web3
Learn what Web3 is, how it works, the key technologies behind it, and the security challenges users face in decentralized ecosystems.

Web3 Wallet
Learn what a Web3 wallet is, how it works, the different types available, and how to secure your wallet against attacks.

Social Engineering
Learn what social engineering is in Web3, common tactics attackers use, and how to protect yourself from psychological manipulation attacks.

Web3 Security
Learn what Web3 security is, the key threats facing decentralized applications and users, and how to protect yourself with a 3-layer security strategy.

Phishing
Learn what phishing is in Web3, common phishing tactics, and how to protect yourself from fake websites and malicious links.

Transaction Poisoning
Learn what transaction poisoning is, how attackers create lookalike transactions to scam users, and how to protect yourself from this attack.

Smart Contract Vulnerability
Learn what smart contract vulnerabilities are, common types of exploits, and how to protect yourself from vulnerable smart contracts.

ApprovalForAll Exploit
Learn what the setApprovalForAll exploit is, how attackers use it to steal NFTs, and how to protect yourself from malicious approval attacks.

Rugpull
Learn what a rugpull is, how scammers execute exit scams, and how to identify and avoid rugpull projects before investing.

Private Key
Learn what a private key is, how it works, why it's critical for Web3 security, and how to protect your private keys from theft.

Non-Fungible Tokens (NFT)
Learn what NFTs are, how they work, their use cases, and how to protect your NFTs from theft and scams.

Multisig Wallet
Learn what multisig wallets are, how they work, their security benefits, and when to use multi-signature wallets.

Malicious Approvals
Learn what malicious approvals are, how attackers use them to drain wallets, and how to protect yourself from approval-based attacks.

Front-End Compromise
Learn what front-end compromise is, how attackers hijack dApp interfaces to steal funds, and how to protect yourself from compromised websites.

Flash-Loan Attack
Learn what flash-loan attacks are, how attackers exploit DeFi protocols using uncollateralized loans, and how to protect yourself.

Fake Airdrop Scam
Learn what fake airdrop scams are, how attackers use them to steal funds, and how to identify and avoid fraudulent airdrop campaigns.

DaaS (Drainer-as-a-Service)
Learn what Drainer-as-a-Service (DaaS) is, how these illicit platforms enable wallet draining attacks, and how to protect yourself.

Crypto Wallet Drainer
Learn what a crypto wallet drainer is, how it works, and how to protect yourself from wallet draining attacks. Complete guide with real-world examples.

Cross-Chain Bridge Vulnerability
Learn what cross-chain bridge vulnerabilities are, how attackers exploit bridges to steal funds, and how to protect yourself when using bridges.

Address Poisoning
Learn what address poisoning is, how attackers use lookalike addresses to scam Web3 users, and how to protect yourself from this social engineering attack.