{"type":"video","version":"1.0","html":"<iframe src=\"https://www.loom.com/embed/9c03cabdd29f4ad096224b6d911f8051\" frameborder=\"0\" width=\"1440\" height=\"1080\" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe>","height":1080,"width":1440,"provider_name":"Loom","provider_url":"https://www.loom.com","thumbnail_height":1080,"thumbnail_width":1440,"thumbnail_url":"https://cdn.loom.com/assets/img/og/slack-protected-video.gif","duration":265.767,"title":"Understanding Re-Entrancy Attacks in System Workflow","description":"In this video, I explain the basic workflow of the system to simulate re-entrancy attacks, detect exploits, and send alerts via emails. The system design involves deploying the contract bank v1, event listeners for withdraw and deposit events, and monitoring user actions. I demonstrate deploying the contract, sending emails, depositing money, detecting attacks, and verifying email notifications. No specific action is requested from viewers."}