Bridging the gap between complex security reports and the practical knowledge developers need. This project provides deep-dive articles on the top attack vectors to help developers build safer protocols.
A constantly updated guide that compiles best practices from security experts for developers in one place, helping them avoid attacks.
| # | Attack Vector | Amount Stolen | Incidents |
|---|---|---|---|
| 1 | Stolen private keys (Coming Soon) | $449,000,000 | 31 |
| 2 | Price oracle manipulation (Coming Soon) | $52,000,000 | 37 |
| 3 | Malicious insider (Coming Soon) | $95,000,000 | 17 |
| 4 | Function parameter validation (Coming Soon) | $69,000,000 | 21 |
| 5 | Insufficient function access controls (Coming Soon) | $27,000,000 | 29 |
| 6 | Reward Manipulation | $17,000,000 | 34 |
| 7 | Reentrancy | $36,000,000 | 15 |
| 8 | Arbitrary External Call | $27,000,000 | 11 |
| 9 | Governance | $30,000,000 | 8 |
| 10 | Uninitialized Proxies | $20,000,000 | 8 |
| # | Attack Vector | Amount Stolen | Incidents |
|---|---|---|---|
| 1 | Stolen private keys (Coming Soon) | $94,000,000 | 15 |
| 2 | Reward Manipulation | $19,000,000 | 26 |
| 3 | Price oracle manipulation (Coming Soon) | $14,000,000 | 28 |
| 4 | Insufficient function access controls (Coming Soon) | $14,000,000 | 26 |
| 5 | Malicious insider (Coming Soon) | $52,700,000 | 6 |
| 6 | Integer overflow and underflow (Coming Soon) | $260,000,000 | 1 |
| 7 | Function parameter validation (Coming Soon) | $14,000,000 | 10 |
| 8 | Rounding errors (Coming Soon) | $10,000,000 | 4 |
| 9 | Business logic error (Coming Soon) | $1,500,000 | 9 |
| 10 | Supply chain attacks (Coming Soon) | $4,700,000 | 2 |