BlockDef Security Dashboard

Monitor smart contract vulnerabilities, security tools, and research insights

Security Weaknesses
Displayed from the Smart Contract Security Weakness Enumeration (SCWE) maintained by OWASP — SCWE
Critical
Reentrancy Attacks

Vulnerability where external calls can recursively call back into the contract before state changes are finalized

A few days ago
High
Integer Overflow/Underflow

Happens on arithmetic operations that exceed the maximum or minimum values for integer types

A few days ago
Medium
Privileged Role Mismanagement

When a smart contract incorrectly assigns roles or permissions, granting excessive privileges to certain users.

A few days ago
Blockchain Security Tools
Essential tools for smart contract security analysis

Mythril - Static Analysis

Security analysis tool smart contracts using symbolic execution

Slither - Static Analysis

Static analysis framework for Solidity with 90+ built-in detectors

Echidna - Fuzzing

Property-based fuzzing tool for smart contracts

Manticore - (Maintenance Mode)

A symbolic execution tool for the analysis of smart contracts and binaries

Trending Research
External security research for this week
DeFi Security

MEV Protection Mechanisms

Latest research on protecting against Maximum Extractable Value attacks

Cryptography

Zero-Knowledge Proof Security

Enhancing Privacy and Security in Large-Language Models: A ZeroKnowledge Proof Approach

Infrastructure

Cross-Chain Bridge Vulnerabilities

Analysis different bridge exploits and best practices

Security Best Practices
Recommended security guidelines and practices

OWASP Smart Contract Security Verification Standard

An open security standard for designing, building, and testing secure smart contracts

Smart Contract Security Verification Standard

Comprehensive checklist for security audits

Advanced Testing Strategies

How to test smart contracts before deploying on the Ethereum network.

EEA EthTrust Security Levels Specification

Certifications confirming a smart contract is free from known security vulnerabilities