Unexpected Ether
DELEGATECALL
Default Visibilities
Short Address/Parameter Attack
Race Condition/Front Running
Block Timestamp Manipulation
Constructors
Floating Point and Precision
TX.ORIGIN Authentication
ECRECOVER issues
Access Control
Reenterancy
Entropy Illusion
External Contract References
Post Fork Values & Contract Location
Contract Libaries
Contract Logic
Unchecked Call return values
Uninitialized Storage Pointers
Denial of Service
Right-to-Left Control Characters
Arithmetic Over/Underflow
Client Access Controls
2FA
Role Enforcement
Session Hijacking
MITM
SQL Injection
Application Logic
Data Encoding
End-to-End Encryption
Backend OS