OWASP スマートコントラクト Top 10 2026

OWASP Smart Contract Logo

スマートコントラクト Top 10 について

The OWASP Smart Contract Top 10 : 2026 is a standard awareness document that aims to provide Web3 developers and security teams with insights into the top 10 vulnerabilities found in smart contracts. It is a sub‑project of the broader OWASP Smart Contract Security (OWASP SCS) initiativearrow-up-right.

It serves as a reference to ensure that smart contracts are secured against the most critical weaknesses exploited or discovered in recent years. The Smart Contract Top 10 can be used alongside other OWASP SCS projects to ensure comprehensive risk coverage:

Use the Top 10 for:

  • Awareness: Understand the most common and critical vulnerabilities affecting smart contracts.

  • Prevention: Implement best practices to safeguard against these known issues.

  • Standard Compliance: A reference to ensure secure development and assessment of smart contracts.

Note: The current 2026 Top 10 is forward-looking: its ordering and category definitions are derived from security incidents and survey data collected during 2025, and then used to forecast which risks are expected to be most significant in the upcoming year. In other words, 2025 breach and vulnerability data provides the empirical foundation, while the 2026 list reflects how those observations are projected into the near future.

This ranking is intended to raise awareness among security researchers, auditors, developers, protocol owners, and the broader industry about the 10 most commonly occurring and impactful smart contract risks.

変更内容 (2025-2026)

OWASP 2025 to 2026 Changes

2026 Top 10 (Forward-Looking)

概要

タイトル
説明

SC01 - Access Control Vulnerabilities

Access control flaws allow unauthorized users or roles to invoke privileged functions or modify critical state, often leading to full protocol compromise when admin, governance, or upgrade paths are exposed.

SC02 - Business Logic Vulnerabilities

Design-level flaws in lending, AMM, reward, or governance logic that break intended economic or functional rules, enabling attackers to extract value even when low-level checks appear correct.

SC03 - Price Oracle Manipulation

Weak oracles and unsafe price integrations that let attackers skew reference prices, enabling under-collateralized borrowing, unfair liquidations, and mispriced swaps as part of larger exploit chains.

SC04 - Flash Loan–Facilitated Attacks

Attacks that use large, uncollateralized flash loans to magnify small bugs (in logic, pricing, or arithmetic) into large drains, by executing complex multi-step sequences in a single transaction.

SC05 - Lack of Input Validation

Missing or weak validation of user, admin, or cross-chain inputs that allows unsafe parameters to reach core logic, corrupting state, breaking assumptions, or enabling direct fund loss.

SC06 - Unchecked External Calls

Unsafe interactions with external contracts or addresses where failures, reverts, or callbacks are not safely handled, often enabling reentrancy or inconsistent state.

SC07 - Arithmetic Errors

Subtle bugs in integer math, scaling, and rounding; especially in share, interest, and AMM calculations; that can be repeatedly exploited to cause precision loss, or siphon value, particularly when paired with flash loans.

SC08 - Reentrancy Attacks

Situations where external calls can re-enter vulnerable functions before state is fully updated, allowing repeated withdrawals or state changes from outdated views of contract state.

SC09 - Integer Overflow and Underflow

Dangerous arithmetic on platforms or code paths without robust overflow checks, leading to wrapped values, broken invariants, and potential drains of liquidity or mis-accounting.

SC10 - Proxy & Upgradeability Vulnerabilities

Misconfigured or weakly governed proxy, initialization, and upgrade mechanisms that let attackers seize control of implementations or reinitialize critical state.

データソース

SolidityScan の Web3HackHub:

OWASP スマートコントラクト Top 10 脆弱性を特定して検証するために、複数の信頼できるソースからの洞察を取り入れ、特に SolidityScan の Web3HackHubarrow-up-right (2025) に注目しました。このリソースは、ブロックチェーン関連のインシデントの包括的なデータベースを提供し、攻撃ベクトル、金銭的損失、傾向に関する貴重なデータを提供します。

Web3HackHub は 2011 年以降の侵害を記録しており、進化する攻撃方法、巧妙化するエクスプロイト、各インシデントから得られた教訓を分析できます。

SolidityScan Web3HackHub 2025

The complete methodology, ranking logic, and external data sources for the 2026 Top 10 are documented on the OWASP SCS site:

  • Methodology & Data for the 2026 Top 10: https://scs.owasp.org/sctop10/data-sources/

On that page you’ll find:

  • How the practitioner survey is designed and how category rankings are aggregated.

  • How 2025 smart‑contract incident data (SolidityScan Web3HackHub, SlowMist, BlockSec, DeFiHackLabs, etc.) is mapped into OWASP categories.

  • Category‑wise loss totals, risk metrics, and the justification for the final ordering.

ライセンス

The OWASP Smart Contract Top 10 (2026) is licensedarrow-up-right under the CC BY-NC-SA 4.0arrow-up-right, the Creative Commons Attribution-ShareAlike 4.0 license. Some rights reserved.

license

プロジェクトリーダー

Last updated