glossary
Bypass
A bypass occurs when attackers exploit flaws or bugs in the security process to prevent it from analyzing the state (transaction, dApp, address) properly. Most of the bypasses used by attackers are targeting the transaction simulation process.
These bypasses can take different forms. Some are designed to cause the simulation to fail entirely, triggering errors that leave security systems without the data needed to assess the transaction’s risks. More complex approaches directly target the simulation, disrupting its ability to flag malicious behavior or allowing the transaction to slip through unnoticed.
Companies like Blockaid are often in a constant game of whack-a-mole to find and mitigate bypasses as they are being found. At Blockaid, we employ a team of cybersecurity researchers who focus on threat hunting - finding the bypasses before the attackers do, and fixing them before they can cause harm to users.
For more information, see our blog post.