-
v3 of the DeFi Matrix will be released in January
-
v1 and v2 can be found below
This work is inspired by attack.mitre.org. Please use attack for "normal" InfoSec/Dev/Sys security check-listing, this is ment to be specialized towards the unique issues brought about in blockchain/cryptocurrency applications (i.e. protocols).
| Protocol / Interaction Based | Blockchain Transaction Based | Non-Blockchain Sources | Blockchain Sources | SWC Registry (Solidity Exploits) |
|---|---|---|---|---|
| Market Attacks | Economic Attack | Off-Chain | On-Chain | Solidity |
| Front-Running | Front-Running | Price Feed | Timestamp Dependence | Integer Overflow and Underflow |
| Coordinated Attack | Insufficient gas griefing | Quote Stuffing | Admin Key | DoS with (Unexpected) revert |
| Liquidity Pocket | Token Inflation | Spoofing | Timelock | DoS with Block Gas Limit |
| Quote Stuffing | Circulating Supply Attack | Credential Access | Lateral Movements | Arithmetic Over/Under Flows |
| Wash Trading | Gas Griefing (DoS) | Reentrancy | Multi-Sig Keys | Forcibly Sending Ether to a Contract |
| Ramping The Market | Network Congestion (uDoS) | Privilege Escalation | Miner Cartel | Delegatecall |
| Cornering The Market | Liquidity Squeeze | Credential Access | Finality | Entropy Illusion |
| Churning | Smurfing | Encryption Protections | Short Address/Parameter Attack | |
| Flash Loans | Phishing | Uninitialised Storage Pointers | ||
| Aggregated Transactions | Unicode Exploits | Floating Points and Numerical Precision | ||
| Bulge Bracket Transactions | API | Right-To-Left-Override control character (U+202E) | ||
| Layering | Blockchain Transaction Based | DNS Attacks | Delegatecall to Untrusted Callee | |
| Spoofing | Governance Attack | Transaction Pool | Transaction Pool | Requirement Violation |
| Order Book | Interlocking Directorate | Checksum Address | Shadowing State Variables | |
| Market Index Calculation Attack | Governance Cartels | Siphon Funds | Transaction Order Dependence | |
| Flash Crash | Assert Violation | |||
| Repo | Stalking Horse | Synthetic Mint Spread | Sole block synchronization | Uninitialized Storage Pointer |
| Excessive Leverage | Syscall Exploit | Unprotected Ether Withdrawal | ||
| Breaking the "Buck" | Container Priv. Esclation | Floating Pragma | ||
| "Fake" News | Keyctl missuse (syscall) | Outdated Compiler Version | ||
| Nested Bot | Function Default Visibility | |||
| Audience of Bots | Influencers' | |||
| Arb. Exploit | ||||
| Slippage Exploit | ||||
| Safety Check Exploits | ||||
| Circulating Supply Dump | ||||
| Governance Cartel | ||||
| Flash "Straddle" | ||||
| Structuring | ||||
| Back-Running |
Ali Atiia John Mardlin Raul Jack samczsun Sam Bacha James Zaki
- Updates to the Sheet can be found in in the 'legend' section
Software Components under Mozilla Public License 2.0
CVE/SWC are licensed under their respective authors licenses.