The attacker could then deposit the procured token B as collateral using the artificially superior place cost in the DEX. Finally, they could make use of a percentage of their borrowed token A to repay the flash loan. This number of transactions would leave the DeFi protocol in an undercollateralized https://borrow-money-from-paychec06841.ttblogs.com/8727347/indicators-on-flash-cash-loan-you-should-know