Problem

Oracle manipulation attacks pose a significant threat to decentralized finance (DeFi) ecosystems. Oracles provide crucial external data to smart contracts, such as asset prices. If an oracle is compromised or manipulated, it can lead to incorrect data being fed to smart contracts, resulting in potential financial losses, liquidations, and exploits.

In addition to oracles, decentralized exchanges (DEXes) using liquidity pools are also susceptible to price manipulation attacks. Malicious actors can manipulate the prices within these liquidity pools by executing large trades, thereby exploiting arbitrage opportunities or triggering liquidations in connected protocols. Therefore, a robust mechanism is needed to detect and mitigate both oracle and liquidity pool price manipulation attacks promptly.

Solution

The Oracle and Liquidity Pool Attack Protection Agent (OLPAPA) is designed to continuously monitor the price points of a given asset across multiple oracles and liquidity pools. It aims to detect any discrepancies or anomalies that may indicate manipulation attacks. Upon detecting significant variations in price data from different sources, the agent will emit events to notify smart contracts and stakeholders about the potential threat.

Overview

How it Works

  1. Oracle and Liquidity Pool Integration:
  2. Data Aggregation:
  3. Discrepancy Detection:
  4. Event Emission:

How Contribution Works

  1. Adding More Supported Oracles:
  2. Adding More Supported Liquidity Pools:
  3. Improving the Oracle Manipulation Deviation Detection Algorithm:

Task Provability

How Results are Proven