Penetrating the Hostile: Detecting DeFi Protocol Exploits through Cross-Contract Analysis | Arena Library | Arena