As adoption of the lightning network increases, so too do concerns around the various known attack vectors. These attacks touch many layers of the lightning network stack: user’s privacy can be undermined, in-flight HTLCs can be exhausted, channel closes can be pinned, among other concerning vectors. This panel will be an investigation of those attacks and discussion around their proposed mitigations.