Blockchain Security
What is Blockchain Security?
Blockchain SecurityThe discipline of protecting distributed ledgers, their consensus mechanisms, smart contracts, and surrounding infrastructure from compromise, fraud, and theft.
Blockchain security covers the full stack of risks affecting public and permissioned ledgers: cryptographic primitives, consensus algorithms (Proof of Work, Proof of Stake), peer-to-peer networking, node operations, smart contract code, bridges, wallets, and the off-chain services and oracles that feed them. Attacks may target the protocol itself (51% attacks, long-range attacks), application logic (reentrancy, oracle manipulation), or users (wallet drainers, phishing). Because transactions are typically immutable and pseudonymous, recovery after a compromise is difficult, so security is enforced through code audits, formal verification, bug bounties, key management, and monitoring of on-chain activity.
● Examples
- 01
The Ronin Bridge hack (March 2022) drained roughly 625 million USD after attackers compromised validator keys.
- 02
The Poly Network exploit (August 2021) saw about 611 million USD moved cross-chain via a contract authority bug.
● Frequently asked questions
What is Blockchain Security?
The discipline of protecting distributed ledgers, their consensus mechanisms, smart contracts, and surrounding infrastructure from compromise, fraud, and theft. It belongs to the Web3 & Blockchain category of cybersecurity.
What does Blockchain Security mean?
The discipline of protecting distributed ledgers, their consensus mechanisms, smart contracts, and surrounding infrastructure from compromise, fraud, and theft.
How does Blockchain Security work?
Blockchain security covers the full stack of risks affecting public and permissioned ledgers: cryptographic primitives, consensus algorithms (Proof of Work, Proof of Stake), peer-to-peer networking, node operations, smart contract code, bridges, wallets, and the off-chain services and oracles that feed them. Attacks may target the protocol itself (51% attacks, long-range attacks), application logic (reentrancy, oracle manipulation), or users (wallet drainers, phishing). Because transactions are typically immutable and pseudonymous, recovery after a compromise is difficult, so security is enforced through code audits, formal verification, bug bounties, key management, and monitoring of on-chain activity.
How do you defend against Blockchain Security?
Defences for Blockchain Security typically combine technical controls and operational practices, as detailed in the full definition above.
What are other names for Blockchain Security?
Common alternative names include: Web3 security, DLT security.
● Related terms
- web3№ 1056
Smart Contract Security
The practice of designing, reviewing, and operating on-chain programs so they cannot be exploited to steal funds, freeze logic, or violate intended business rules.
- web3№ 1055
Smart Contract Audit
An independent security review of smart-contract source code, deployment configuration, and economic design to find vulnerabilities before launch or upgrade.
- web3№ 910
Reentrancy Attack
A smart-contract exploit where an external call lets the attacker re-enter the calling function before its state is updated, draining funds in a recursive loop.
- web3№ 765
Oracle Manipulation
An attack that distorts the price or data feed used by a smart contract so the contract makes wildly wrong decisions about lending, liquidations, or settlement.
- web3№ 1221
Wallet Drainer
Malicious software or a phishing kit that tricks crypto-wallet users into signing transactions or approvals that hand over all valuable tokens and NFTs.
- web3№ 003
51% Attack
An attack where a single entity controls a majority of a blockchain's mining hash rate or staking power and uses it to rewrite history, double-spend, or censor transactions.
● See also
- № 424Flash Loan Attack
- № 952Rug Pull
- № 435Front-Running (Blockchain)
- № 675MEV (Maximal Extractable Value)
- № 965Sandwich Attack
- № 1003Seed Phrase
- № 198Cold Wallet
- № 491Hot Wallet