DeFi Security Part 1: Data Security Vulnerabilities