

R4Y
62 posts

@_0xR4Y
Smart contract security researcher













List of Some Attack Vectors/Smart Contract Vulnerabilities! - Reentrancy - Reentrancy via Modifier - Read-Only Reentrancy - Cross-Function Reentrancy - Cross-Contract Reentrancy - Front-Running - Front-Running - Unprotected withdraw - Front-Running - Sandwich attack - Front-Running - ERC20 approval - Front-Running - Signatures - Back-Running - Flash-Loan Governance Attack - Flash-Loan Price Attack - Denial Of Service (DOS) by complex fallback function - Denial Of Service (DOS) by gas limit - Denial Of Service (DOS) by non-existent address or malicious contract - Floating Point Arithmetic - ECDSA Signature malleability - ECDSA Signature replay - Replay Attack - DAO Attacks - Price Oracle Manipulation - Cross-Chain Bridge Manipulation - Initial Supply Mint Issue - Divide before multiply - Unchecked External Calls - Integer Underflow - DeFi Slippage attack - Amplification Attack Double Spending - Malicious Honeypot - Unsafe Delegatecalls - Loops Gas Limit - Short Address/Parameter Attack - Phishing With Improper Authorization - Unexpected Ether With Forcibly Sending Ether - Block timestamp Manipulation - Unchecked return values - Insecure Randomness - Proxy Storage Collision - Strict equalities - Timestamp Dependence - Use of Deprecated Functions - Requirement Validation - Business logic - Absent modifiers - Force Feeding - Gas Limit Exhaustion - Rounding Down To Zero What are we missing?







