The OWASP Smart Contract Top 10 (2025)

OWASP groups the most critical smart contract risks into ten categories. These aren’t random — they’re the vulnerabilities that keep showing up in audits, hacks, and post-mortems.

CodeVulnerability NameWhat It Means
SC01:2025Access Control VulnerabilitiesMissing or weak permission checks that let outsiders do things they shouldn’t.
SC02:2025Price Oracle ManipulationAttackers trick the contract by feeding it manipulated external price data.
SC03:2025Logic ErrorsBugs in the business logic that make the contract behave in ways you didn’t intend.
SC04:2025Lack of Input ValidationContracts trusting whatever input they receive — a big mistake.
SC05:2025Reentrancy AttacksThe classic exploit where an attacker re-enters a function before it finishes, often draining funds.
SC06:2025Unchecked External CallsContracts calling outside code without checking whether things worked.
SC07:2025Flash Loan AttacksUsing massive temporary liquidity to manipulate markets or protocol state in one transaction.
SC08:2025Integer Overflow & UnderflowMath errors caused by fixed-size integers, often leading to messed-up balances.
SC09:2025Insecure Randomness“Random” values that aren’t actually random — easy pickings for attackers.
SC10:2025Denial of Service (DoS)Making a contract unusable by exhausting resources or forcing constant reverts.

Lascia un commento

Il tuo indirizzo email non sarà pubblicato. I campi obbligatori sono contrassegnati *

Explore More

Microsoft vuole interrompere Cobalt Strike

I motivi per il quale Microsoft vuole interrompere Cobalt Strike, sono che i criminali del ransomware hanno sfruttato il software per aumentare i privilegi dopo aver ottenuto l’accesso iniziale a

La guida definitiva per evitare i 10 principali errori di sicurezza informatica commessi dalle aziende

28 agosto 2023 La sicurezza informatica non è un campo statico; è una guerra continua tra i criminali informatici che cercano di trovare nuovi exploit e le aziende che lavorano

50 Best Free Cyber Threat Intelligence Tools – 2023

By BALAJI N February 5, 2023 https://gbhackers.com/cyber-threat-intelligence-tools/ Threat Intelligence Tools are more often used by security industries to test the vulnerabilities in network and applications. It helps with the collection