Ethereum is the most battle-tested smart contract platform and home to over $50 billion in TVL. It is also the most heavily targeted by attackers. Understanding Ethereum-specific security risks is essential before deploying any contract to mainnet.
Maximal Extractable Value (MEV) is a form of economic extraction unique to Ethereum's mempool. Validators and searchers monitor pending transactions and inject their own — ahead of yours — to profit from price impact. Common forms include:
Mitigate MEV with slippage limits, commit-reveal schemes, or submission through Flashbots' private mempool (flashbots.net).
The most notorious Ethereum vulnerability — exploited in the 2016 DAO hack for 3.6 million ETH. Ethereum's low-level .call{value:} passes all available gas to the recipient, enabling recursive re-entry before state updates complete. See the full explanation in our reentrancy glossary entry.
Several high-value Ethereum tokens violate the ERC20 standard in ways that cause integration bugs. USDT does not return a boolean, WETH's permit is a no-op, and AMP uses ERC777 hooks that enable reentrancy. See our token risk profiles for the complete list with per-token remediation advice.
Ethereum's gas model allows attackers to force expensive operations in loops — reverting transactions to grief protocols or draining gas from multisigs. Always cap iteration limits and use pull-over-push for Ether distributions.
Most Ethereum contracts implement one or more ERC standards. Each standard introduces a distinct vulnerability surface:
SmartContract.us supports full security analysis for any Ethereum contract by address or source code. The AI audit includes reentrancy detection, token risk scanning, and an executive summary in plain language. Analyze an Ethereum contract →