The OWASP Smart Contract Top 10 (2025)

OWASP groups the most critical smart contract risks into ten categories. These aren’t random — they’re the vulnerabilities that keep showing up in audits, hacks, and post-mortems.

CodeVulnerability NameWhat It Means
SC01:2025Access Control VulnerabilitiesMissing or weak permission checks that let outsiders do things they shouldn’t.
SC02:2025Price Oracle ManipulationAttackers trick the contract by feeding it manipulated external price data.
SC03:2025Logic ErrorsBugs in the business logic that make the contract behave in ways you didn’t intend.
SC04:2025Lack of Input ValidationContracts trusting whatever input they receive — a big mistake.
SC05:2025Reentrancy AttacksThe classic exploit where an attacker re-enters a function before it finishes, often draining funds.
SC06:2025Unchecked External CallsContracts calling outside code without checking whether things worked.
SC07:2025Flash Loan AttacksUsing massive temporary liquidity to manipulate markets or protocol state in one transaction.
SC08:2025Integer Overflow & UnderflowMath errors caused by fixed-size integers, often leading to messed-up balances.
SC09:2025Insecure Randomness“Random” values that aren’t actually random — easy pickings for attackers.
SC10:2025Denial of Service (DoS)Making a contract unusable by exhausting resources or forcing constant reverts.

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Explore More

What is an image replay attack ?

An image replay attack is the use of a picture to fool an authentication method. Image replay attacks are most commonly used by an attacker trying to gain entry to

Network Security Checklist – Complete Guide To Protect Enterprise Networks – 2023

By Cyber Writes Team – June 1, 2023 Network security is paramount in today’s digital landscape, where organizations face increasingly sophisticated threats. This guide presents a detailed Network Security checklist

Recon Tool: Sniffer

Sniffer di chenjiandongx, è uno strumento per la risoluzione dei problemi di rete che consente di analizzare il traffico e i processi di rete senza caricare alcun modulo del kernel.