<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>WazirX Guide</provider_name><provider_url>https://wazirx.com/guide</provider_url><author_name>harshita</author_name><author_url>https://wazirx.com/guide/author/harshita/</author_url><title>Design Flaw Attack - WazirX Guide</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="8Ji1pVf99I"&gt;&lt;a href="https://wazirx.com/guide/glossary/design-flaw-attack/"&gt;Design Flaw Attack&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://wazirx.com/guide/glossary/design-flaw-attack/embed/#?secret=8Ji1pVf99I" width="600" height="338" title="&#x201C;Design Flaw Attack&#x201D; &#x2014; WazirX Guide" data-secret="8Ji1pVf99I" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://wazirx.com/guide/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><description>A smart contract attack known as a design flaw occurs when the smart contract designer introduces a weakness to their plan to exploit unaware users later. For example, it may be applied to purposely unfair or ambiguous definitions that penalize users, rug pools (code that enables the author to drain users' liquidity into their own wallet), or other things.</description></oembed>
