Table 1 Various smart contact vulnerabilities.
From: Enhancing smart contract security using a code representation and GAN based methodology
Level | Vulnerability | Root | Example of attack |
|---|---|---|---|
Code | Integer Overflow | Improper Validation | BEC Token Attack: Exploits arithmetic overflow in smart contracts |
Reentrancy | External Call Vulnerability | DAO Attack | |
Delegatecall Attack | Misuse of delegatecall | Attack on the Parity Multi-Sig Wallet | |
Denial-of-Service (DoS) | Improper Validation | Ether King | |
EVM | Transferring Ether Losses | Missing Address Validation | You can send funds to an unreadable address |
tx.origin Attack | Misuse of tx.origin | THORChain Hack | |
Short Address Attack | Missing Input Length Check | ERC20 Attack | |
Blockchain | Reliability on Time Stamps | Manipulable Block Timestamp | Allows miners to control timed operations |
Dependency on Transaction Order | Miner-Controlled Transaction Order | This allows for both transaction management and front-running | |
Information Dependency Block | Predictable Randomness | Unfair use of weak randomness is possible |