## Outline:I. Introduction- Brief overview of the reported attack on the Merlin Dex liquidity pool- Introduction to the Beosin EagleEye security risk monitoring