glossary

Bypass

Definition
A term used by malicious actors to describe methods that allow drainers to prompt a malicious transaction without the transaction being flagged by security providers.
Description

A bypass occurs when attackers exploit flaws or bugs in the security process to prevent it from analyzing the state (transaction, dApp, address) properly. Most of the bypasses used by attackers are targeting the transaction simulation process.

These bypasses can take different forms. Some are designed to cause the simulation to fail entirely, triggering errors that leave security systems without the data needed to assess the transaction’s risks.   More complex approaches directly target the simulation, disrupting its ability to flag malicious behavior or allowing the transaction to slip through unnoticed.

Companies like Blockaid are often in a constant game of whack-a-mole to find and mitigate bypasses as they are being found. At Blockaid, we employ a team of cybersecurity researchers who focus on threat hunting - finding the bypasses before the attackers do, and fixing them before they can cause harm to users.

For more information, see our blog post.

Stay ahead of attackers with Blockaid