Top 10 Attack Vectors

Bridging the gap between complex security reports and the practical knowledge developers need. This project provides deep-dive articles on the top attack vectors to help developers build safer protocols.

A constantly updated guide that compiles best practices from security experts for developers in one place, helping them avoid attacks.

# Attack Vector Amount Stolen Incidents
1 Stolen private keys (Coming Soon) $449,000,000 31
2 Price oracle manipulation (Coming Soon) $52,000,000 37
3 Malicious insider (Coming Soon) $95,000,000 17
4 Function parameter validation (Coming Soon) $69,000,000 21
5 Insufficient function access controls (Coming Soon) $27,000,000 29
6 Reward manipulation (Coming Soon) $17,000,000 34
7 Reentrancy (Coming Soon) $36,000,000 15
8 Arbitrary external call (Coming Soon) $27,000,000 11
9 Governance (Coming Soon) $30,000,000 8
10 Uninitialized Proxies $20,000,000 8
# Attack Vector Amount Stolen Incidents
1 Stolen private keys (Coming Soon) $94,000,000 15
2 Reward manipulation (Coming Soon) $19,000,000 26
3 Price oracle manipulation (Coming Soon) $14,000,000 28
4 Insufficient function access controls (Coming Soon) $14,000,000 26
5 Malicious insider (Coming Soon) $52,700,000 6
6 Integer overflow and underflow (Coming Soon) $260,000,000 1
7 Function parameter validation (Coming Soon) $14,000,000 10
8 Rounding errors (Coming Soon) $10,000,000 4
9 Business logic error (Coming Soon) $1,500,000 9
10 Supply chain attacks (Coming Soon) $4,700,000 2