>KEYPRESS_SECURITY_ARENA
Arena

SIMULATION_ARENA

Select a vulnerability module to begin the exploitation simulation.
WARNING: Only deploy to Devnet.

[MOD_01]
ONLINE

PDA SHARING

Exploit shared authority vulnerability in multi-vault systems. Target the Whale Vault.

DIFFICULTY: INTERMEDIATE
INITIALIZE_KERNEL >
[MOD_02]
ONLINE

ACCOUNT RELOADING

Demonstrate Anchor state inconsistency after CPI calls. Bypass withdrawal limits.

DIFFICULTY: ADVANCED
INITIALIZE_KERNEL >
[MOD_03]
ONLINE

REVIVAL ATTACK

Revive 'closed' accounts to reuse existing state and drain funds repeatedly.

DIFFICULTY: ADVANCED
INITIALIZE_KERNEL >
[MOD_04]
ONLINE

INTEGER OVERFLOW

Trigger arithmetic underflow to corrupt user balances and drain revenue vaults.

DIFFICULTY: ROOKIE
INITIALIZE_KERNEL >
[MOD_05]
ONLINE

DUPLICATE MUTABLE ACCOUNTS

The Money Printer Glitch — pass the same account twice to print free tokens in DEX swaps.

DIFFICULTY: INTERMEDIATE
INITIALIZE_KERNEL >
[MOD_06]
ONLINE

ARBITRARY CPI

The Tip Jar Heist — pass a fake program ID for CPI calls to hijack transactions.

DIFFICULTY: INTERMEDIATE
INITIALIZE_KERNEL >
[MOD_07]
ONLINE

DATA MATCHING

The Identity Theft — create fake config accounts to bypass has_one validation checks.

DIFFICULTY: INTERMEDIATE
INITIALIZE_KERNEL >
[MOD_08]
COMING SOON

SIGNER CHECKS

Exploit missing signature verification to drain victim vaults using only their public address.

DIFFICULTY: ROOKIE
PINOCCHIO
[MOD_09]
COMING SOON

OWNER CHECKS

Bypass account ownership validation to manipulate data in accounts you don't own.

DIFFICULTY: ROOKIE
PINOCCHIO