Oracle Manipulation
Web3 / defi
Oracle manipulation attacks exploit price oracle vulnerabilities to manipulate the external data feeds that smart contracts rely on for pricing information, collateral valuation, and liquidation decisions. Attackers can artificially inflate or deflate asset prices reported to smart contracts by controlling exchange prices on low-liquidity venues, attacking decentralized oracle aggregators, or compromising centralized data providers. DeFi protocols using single oracle sources or flash loan-vulnerable pricing mechanisms are particularly susceptible. Once prices are manipulated, attackers can exploit lending protocols to over-borrow against artificially inflated collateral or trigger liquidations on artificially deflated positions, extracting significant value from the compromised protocol. Example: In 2020, the bZx protocol was attacked through flash loans that manipulated the sUSD price feed by creating massive trades on Kyber Network, allowing attackers to borrow assets at incorrect rates and liquidate positions profitably within a single transaction. Why it matters for DeFi: Oracle manipulation represents a critical systemic risk across DeFi since most protocols depend on accurate price feeds. Protocols must implement multiple independent oracle sources, time-weighted average prices (TWAP), circuit breakers, and flash loan safeguards to prevent attackers from weaponizing oracle data to extract protocol value and user collateral.
Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.