Atomic Swaps (Global)
High-quality technical overview of Atomic Swaps in the context of blockchain security.
Common Attack Vectors: 1. Social Engineering: Phishing, Vishing, Smishing. 2. Exploits: SQLi, XSS, Zero-days. 3. Credentials: Brute force, Credential stuffing. 4. Network: MitM attacks, Rogue Wi-Fi. 5. Supply Chain: Malicious dependencies, CI/CD pipeline compromises.
graph LR
Center["Atomic Swaps (Global)"]:::main
Rel_atomic_swap["atomic-swap"]:::related -.-> Center
click Rel_atomic_swap "/terms/atomic-swap"
classDef main fill:#7c3aed,stroke:#8b5cf6,stroke-width:2px,color:white,font-weight:bold,rx:5,ry:5;
classDef pre fill:#0f172a,stroke:#3b82f6,color:#94a3b8,rx:5,ry:5;
classDef child fill:#0f172a,stroke:#10b981,color:#94a3b8,rx:5,ry:5;
classDef related fill:#0f172a,stroke:#8b5cf6,stroke-dasharray: 5 5,color:#94a3b8,rx:5,ry:5;
linkStyle default stroke:#4b5563,stroke-width:2px;
🧒 Wyjaśnij jak 5-latkowi
If your computer is a house, an attack vector is any way a thief could try to get in. One vector might be an unlocked window (a software bug), another might be tricking you into handing over your front door key ([phishing](/pl/terms/phishing)), and another might be a secret tunnel you forgot to seal (an old, unused login).
🤓 Expert Deep Dive
Attack vectors are categorized by their target and mechanism. 'External vectors' originate from outside the network perimeter (e.g., exploiting a public-facing API), while 'Internal vectors' leverage inside access (e.g., a rogue employee or an infected laptop). Modern cybersecurity emphasizes 'Defense-in-Depth' to address vectors across multiple layers: the Human Layer (training), the Perimeter Layer (firewalls), the Network Layer (segmentation), and the Application Layer (code audits). A critical emerging vector is the 'Software Supply Chain', where attackers compromise common libraries or build tools to inject malware into the software before it even reaches the target.