Bridging the gap between complex security reports and the practical knowledge developers need. This project provides deep-dive articles on the top attack vectors to help developers build safer protocols.
A constantly updated guide that compiles best practices from security experts for developers in one place, helping them avoid attacks.
# | Attack Vector | Amount Stolen | Incidents |
---|---|---|---|
1 | Stolen private keys (Coming Soon) | $449,000,000 | 31 |
2 | Price oracle manipulation (Coming Soon) | $52,000,000 | 37 |
3 | Malicious insider (Coming Soon) | $95,000,000 | 17 |
4 | Function parameter validation (Coming Soon) | $69,000,000 | 21 |
5 | Insufficient function access controls (Coming Soon) | $27,000,000 | 29 |
6 | Reward manipulation (Coming Soon) | $17,000,000 | 34 |
7 | Reentrancy (Coming Soon) | $36,000,000 | 15 |
8 | Arbitrary external call (Coming Soon) | $27,000,000 | 11 |
9 | Governance (Coming Soon) | $30,000,000 | 8 |
10 | Uninitialized Proxies | $20,000,000 | 8 |
# | Attack Vector | Amount Stolen | Incidents |
---|---|---|---|
1 | Stolen private keys (Coming Soon) | $94,000,000 | 15 |
2 | Reward manipulation (Coming Soon) | $19,000,000 | 26 |
3 | Price oracle manipulation (Coming Soon) | $14,000,000 | 28 |
4 | Insufficient function access controls (Coming Soon) | $14,000,000 | 26 |
5 | Malicious insider (Coming Soon) | $52,700,000 | 6 |
6 | Integer overflow and underflow (Coming Soon) | $260,000,000 | 1 |
7 | Function parameter validation (Coming Soon) | $14,000,000 | 10 |
8 | Rounding errors (Coming Soon) | $10,000,000 | 4 |
9 | Business logic error (Coming Soon) | $1,500,000 | 9 |
10 | Supply chain attacks (Coming Soon) | $4,700,000 | 2 |