To check if a protocol has been exploited in the past, simply search for it through our handy search input on the Rekt Database:
If any results are found, they’ll be displayed below with a clear explanation of what took place, the contracts affected, relevant, links, etc:
Click on the arrow in the “Details“ column to see some additional information!