How Can an Oracle Be Manipulated in a Price Feed Attack?

An oracle can be manipulated by feeding it false price data. This often occurs when the oracle relies on a single, easily influenced data source, such as a low-liquidity decentralized exchange (DEX).

An attacker can execute a flash loan to temporarily swamp the DEX's liquidity, drastically altering the token price for a brief period. The oracle records this incorrect price, which is then used by a DeFi protocol to execute a malicious action, like under-collateralized borrowing or liquidation.

How Can Smart Contract Auditors Identify the Potential for a Flash Loan to Be Used for Oracle Manipulation?
How Can a Flash Loan Attack Exploit a Vulnerable Oracle Used by an Options Protocol?
What Is a “Flash Loan” and How Does It Relate to Market Manipulation Risks on DEXs?
What Is the Risk of a Single-Source Price Feed Oracle?
Can You Describe a Real-World Example of a Major Flash Loan Attack on a DEX?
How Do Decentralized Oracle Networks (DONs) Mitigate Price Feed Attacks?
What Is a Flash Loan and How Does It Enable a Price Feed Attack?
What Is the Risk of a “Flash Loan Attack” on a DEX Liquidity Pool?

Glossar