OWASP Smart Contract Top 10 (2025)
The most critical security risks facing smart contracts and Web3 applications in 2025. Our data shows access control vulnerabilities alone accounted for 67% of losses in 2024.
Access Control Vulnerabilities
Improper access controls allowing unauthorized users to execute privileged functions.
Reentrancy Attacks
External calls that allow attackers to recursively call functions before state updates.
Integer Overflow/Underflow
Mathematical operations that exceed variable limits causing unexpected behavior.
Unchecked External Calls
Failed external calls that don't properly handle return values or exceptions.
Denial of Service
Contract states or gas limit exploits that prevent normal operation.
Bad Randomness
Predictable random number generation that can be exploited by attackers.
Front-running
Transaction ordering manipulation in mempool for financial advantage.
Time Manipulation
Reliance on block timestamps that miners can manipulate within limits.
Short Address Attack
EVM padding behavior exploited through malformed address parameters.
Unchecked Return Values
Silent failures from external calls that don't validate return values.