OWASP スマートコントラクト Top 10 2026

スマートコントラクト Top 10 について
The OWASP Smart Contract Top 10 : 2026 is a standard awareness document that aims to provide Web3 developers and security teams with insights into the top 10 vulnerabilities found in smart contracts. It is a sub‑project of the broader OWASP Smart Contract Security (OWASP SCS) initiative.
It serves as a reference to ensure that smart contracts are secured against the most critical weaknesses exploited or discovered in recent years. The Smart Contract Top 10 can be used alongside other OWASP SCS projects to ensure comprehensive risk coverage:
OWASP SC Top 10 live site (2026): https://scs.owasp.org/sctop10/
OWASP SC Weakness Enumeration (SCWE): https://scs.owasp.org/SCWE/
OWASP SCS Checklist: https://scs.owasp.org/checklists/
Use the Top 10 for:
Awareness: Understand the most common and critical vulnerabilities affecting smart contracts.
Prevention: Implement best practices to safeguard against these known issues.
Standard Compliance: A reference to ensure secure development and assessment of smart contracts.
Note: The current 2026 Top 10 is forward-looking: its ordering and category definitions are derived from security incidents and survey data collected during 2025, and then used to forecast which risks are expected to be most significant in the upcoming year. In other words, 2025 breach and vulnerability data provides the empirical foundation, while the 2026 list reflects how those observations are projected into the near future.
This ranking is intended to raise awareness among security researchers, auditors, developers, protocol owners, and the broader industry about the 10 most commonly occurring and impactful smart contract risks.
変更内容 (2025-2026)

2026 Top 10 (Forward-Looking)
SC01:2026 - アクセス制御の脆弱性 (Access Control Vulnerabilities)
SC02:2026 - ビジネスロジックの脆弱性 (Business Logic Vulnerabilities)
SC03:2026 - 価格オラクル操作 (Price Oracle Manipulation)
SC04:2026 - フラッシュローンを利用した攻撃 (Flash Loan–Facilitated Attacks)
SC05:2026 - 入力バリデーションの欠如 (Lack of Input Validation)
SC06:2026 - チェックされていない外部呼び出し (Unchecked External Calls)
SC07:2026 - 算術エラー (Arithmetic Errors)
SC08:2026 - 再入攻撃 (Reentrancy Attacks)
概要
SC01 - Access Control Vulnerabilities
Access control flaws allow unauthorized users or roles to invoke privileged functions or modify critical state, often leading to full protocol compromise when admin, governance, or upgrade paths are exposed.
SC02 - Business Logic Vulnerabilities
Design-level flaws in lending, AMM, reward, or governance logic that break intended economic or functional rules, enabling attackers to extract value even when low-level checks appear correct.
SC03 - Price Oracle Manipulation
Weak oracles and unsafe price integrations that let attackers skew reference prices, enabling under-collateralized borrowing, unfair liquidations, and mispriced swaps as part of larger exploit chains.
SC04 - Flash Loan–Facilitated Attacks
Attacks that use large, uncollateralized flash loans to magnify small bugs (in logic, pricing, or arithmetic) into large drains, by executing complex multi-step sequences in a single transaction.
SC05 - Lack of Input Validation
Missing or weak validation of user, admin, or cross-chain inputs that allows unsafe parameters to reach core logic, corrupting state, breaking assumptions, or enabling direct fund loss.
SC06 - Unchecked External Calls
Unsafe interactions with external contracts or addresses where failures, reverts, or callbacks are not safely handled, often enabling reentrancy or inconsistent state.
SC07 - Arithmetic Errors
Subtle bugs in integer math, scaling, and rounding; especially in share, interest, and AMM calculations; that can be repeatedly exploited to cause precision loss, or siphon value, particularly when paired with flash loans.
SC08 - Reentrancy Attacks
Situations where external calls can re-enter vulnerable functions before state is fully updated, allowing repeated withdrawals or state changes from outdated views of contract state.
SC09 - Integer Overflow and Underflow
Dangerous arithmetic on platforms or code paths without robust overflow checks, leading to wrapped values, broken invariants, and potential drains of liquidity or mis-accounting.
SC10 - Proxy & Upgradeability Vulnerabilities
Misconfigured or weakly governed proxy, initialization, and upgrade mechanisms that let attackers seize control of implementations or reinitialize critical state.
データソース
SolidityScan の Web3HackHub:
OWASP スマートコントラクト Top 10 脆弱性を特定して検証するために、複数の信頼できるソースからの洞察を取り入れ、特に SolidityScan の Web3HackHub (2025) に注目しました。このリソースは、ブロックチェーン関連のインシデントの包括的なデータベースを提供し、攻撃ベクトル、金銭的損失、傾向に関する貴重なデータを提供します。
Web3HackHub は 2011 年以降の侵害を記録しており、進化する攻撃方法、巧妙化するエクスプロイト、各インシデントから得られた教訓を分析できます。

The complete methodology, ranking logic, and external data sources for the 2026 Top 10 are documented on the OWASP SCS site:
Methodology & Data for the 2026 Top 10: https://scs.owasp.org/sctop10/data-sources/
On that page you’ll find:
How the practitioner survey is designed and how category rankings are aggregated.
How 2025 smart‑contract incident data (SolidityScan Web3HackHub, SlowMist, BlockSec, DeFiHackLabs, etc.) is mapped into OWASP categories.
Category‑wise loss totals, risk metrics, and the justification for the final ordering.
ライセンス
The OWASP Smart Contract Top 10 (2026) is licensed under the CC BY-NC-SA 4.0, the Creative Commons Attribution-ShareAlike 4.0 license. Some rights reserved.

プロジェクトリーダー
Jinson Varghese Behanan (Twitter: @JinsonCyberSec)
Shashank (Twitter: @cyberboyIndia)
Last updated