Hi there students,
I had just created my account and was writing my first article about the future of DeFi, when I saw the news that Venus protocol was exploited. One of the things I love to analyze are exploits, to see how people manage to bypass security systems to make money from the protocols. Let’s dive into it!
- What is Venus protocol?