Welcome to the Move Vulnerability Database (MVD) v2.0!

A comprehensive collection of vulnerability patterns in the Move ecosystem.

What's Inside


This resource consolidates 500+ security vulnerabilities extracted from 150+ public Move audit reports across multiple firms and auditors. The database categorizes vulnerabilities into common patterns—from Input Validation and Business Logic flaws to Access Control and State Management issues—providing a central reference for developers, auditors, and security researchers to understand, recognize, and learn from real-world mistakes in Move codebases.

Vulnerability PatternsFindings
Business Logic137
Calculation Errors87
Input Validation59
Access Control41
State Management37
Denial of Service27
Oracle Issues19
Data Inconsistency17
Missing Functions17
Centralization Risk16
Gas-related Issues11
Runtime/Development Issues10
Constant Definition7
Looping Issues6
Front-running5
Cross-Implementation2
Missing Version Check2
Inflation Attacks1
Total501

Data sourced from public Move audit reports by the following auditors/firms:

Refer to the Appendix for the full list of reports and protocols.

⚠️ Disclaimer

All findings and summaries in this database are sourced from publicly available audit reports.

I do not own or claim ownership of any reports, documents, or content referenced here — all rights belong to their respective auditors, firms, and project teams.

This repository is an independent, educational, and non-commercial project created to help the community study and understand common vulnerability patterns in the Move ecosystem.

While I aim for accuracy, there may be typos, errors, broken links, or misattributed information.

If you spot any mistakes or missing details, please open an issue or reach out so I can correct them.

💬 Support & Contributions

If you'd like to learn more about the project or support future development, see the About section.