Index

Tip

Seeking more detailed information on smart contract attacks? The Smart Contract Security Field Guide offers an extensive range of attack strategies with in-depth explanations on vulnerabilities, including new code samples for a hands-on learning experience. Enhance your understanding and stay ahead of potential threats by visiting this continuously updated resource.

The following is a list of known attacks which you should be aware of, and defend against when writing smart contracts.

Category Description
Reentrancy Intra- and inter-function reentrancy attacks and potentially faulty solutions to them.
Oracle Manipulation Manipulation of external data providers and potential solutions to oracle security issues.
Frontrunning A definition and taxonomy around frontrunning and related attacks.
Timestamp Dependence Attacks relating to the timing of a transaction.
Insecure Arithmetic Integer overflows and underflows.
Denial of Service Denial of service attacks through unexpected reverts and the block gas limit.
Griefing Attacks relating to bad faith players around a smart contract system.
Force Feeding Forcing Ether to be sent to smart contracts to manipulate balance checks.
Deprecated/Historical Attacks that are part of Ethereum's history and vulnerabilities that have been fixes on a (Solidity) compiler level.
More Where to find more information about vulnerabilities and weaknesses.