An exploit where a malicious contract calls back into the vulnerable contract before the first execution is complete, manipulating state that hasn't been updated yet. The classic example is The DAO hack (2016). Prevented by the checks-effects-interactions pattern and reentrancy guards (mutex locks).
Security
Reentrancy Attack
Related terms in Security
Flash Loan Attack
An exploit that uses uncollateralized flash loans to temporarily manipulate prices, governance votes, or oracl...
Front-running
Observing a pending transaction in the mempool and submitting a transaction with a higher gas price to execute...
Invariant
A condition that must always be true throughout a contract's execution. In Uniswap V2, the key invariant is x ...
CEI Pattern
Checks-Effects-Interactions pattern. A Solidity best practice where you first validate inputs (Checks), then u...