Vulnerability Patterns Overview

The table below presents the total number of findings for each vulnerability pattern across all analyzed contracts.

Vulnerability PatternsFindings
Business Logic296
Input Validation170
Calculation Errors148
Coding Mistake76
Access Control73
State Management64
Code Optimization43
Denial of Service40
Missing Functions37
Data Inconsistency31
Oracle Issues27
Centralization Risk25
Constant Definition21
Cross-Implementation16
Runtime/Development Issues15
Missing Version Check12
Gas-related Issues11
Looping Issues10
Front-running7
Collision5
Inflation Attacks5
Documentation Mismatch3
Signature Replay3
Third-Party Risk2
Race Condition1
Total1141

As we can see, business logic vulnerabilities account for more than 25% of the database findings. Input validation was the second most common issue, followed by calculation errors.

Next, let's examine the vulnerability patterns in detail, broken down by severity.

Vulnerability PatternsCHMLTotal
Business Logic215889128296
Input Validation16293491170
Calculation Errors13286146148
Coding Mistake0007676
Access Control1320142673
State Management714192464
Code Optimization0004343
Denial of Service2427740
Missing Functions13151837
Data Inconsistency21010931
Oracle Issues3511827
Centralization Risk0810725
Constant Definition3251121
Cross-Implementation0021416
Runtime/Development Issues0010515
Missing Version Check021912
Gas-related Issues0011011
Looping Issues033410
Front-running03227
Collision00145
Inflation Attacks00145
Documentation Mismatch00033
Signature Replay00033
Third-Party Risk00022
Race Condition00011
Total811893265451141

Based on Criticals and Highs: Business Logic, Input Validation, Calculation Errors, Access Control, and State Management are the top 5 vulnerability classes.

Based on Mediums: Business Logic, Calculation Errors, and Input Validation are the top 3 most commonly found vulnerability patterns.

Coding Mistakes and Code Optimization were the most commonly found Low severity issues.

💡 Note

The Move Vulnerability Database provides a comprehensive overview of vulnerabilities observed across audited Move protocols and serves as a guide to understanding risk concentration. Readers are encouraged to use the data to draw their own conclusions, identify trends, and consider protocol context, design, and specific use cases when assessing potential vulnerabilities.