Vulnerability Patterns Overview

The table below presents the total number of findings for each vulnerability pattern across all analyzed contracts.

Vulnerability PatternsFindings
Business Logic137
Calculation Errors87
Input Validation59
Access Control41
State Management37
Denial of Service27
Oracle Issues19
Data Inconsistency17
Missing Functions17
Centralization Risk16
Gas-related Issues11
Runtime/Development Issues10
Constant Definition7
Looping Issues6
Front-running5
Cross-Implementation2
Missing Version Check2
Inflation Attacks1
Total501

As we can see, business logic vulnerabilities account for more than 25% of the database findings. Calculation errors were the second most common issue, followed by input validation.

Next, let's examine the vulnerability patterns in detail, broken down by severity.

Vulnerability PatternsRWECHMTotal
Business Logic175070137
Calculation Errors10255287
Input Validation14232259
Access Control12181141
State Management7131737
Denial of Service122427
Oracle Issues1341119
Data Inconsistency29617
Missing Functions131317
Centralization Risk8816
Gas-related Issues1111
Runtime/Development Issues1010
Constant Definition2147
Looping Issues1236
Front-running325
Cross-Implementation22
Missing Version Check22
Inflation Attacks11
Total170163267501

Based on Criticals and Highs: Business Logic, Input Validation, Calculation Errors, Access Control, and State Management are the top 5 vulnerability classes.

Based on Mediums: Business Logic, Calculation Errors, and Denial of Service are the top 3 most commonly found vulnerability patterns.

💡 Note

The Move Vulnerability Database provides a comprehensive overview of vulnerabilities observed across audited Move protocols and serves as a guide to understanding risk concentration. Readers are encouraged to use the data to draw their own conclusions, identify trends, and consider protocol context, design, and specific use cases when assessing potential vulnerabilities.