An auditor is reviewing a DeFi protocol and identifies a vulnerability where an attacker can borrow a massive amount of cryptocurrency without collateral, manipulate an asset's price on a decentralized exchange, and then repay the loan within the same transaction, profiting from the price difference. What is this type of exploit called?
-
A
Reentrancy Attack
-
B
51% Attack
-
C
Flash Loan Attack
-
D
Sybil Attack