Web3 Dictionary Logo
Web3 Dictionary
Contribute

Categories

AllBlockchainDappsDAOsDeFiNFTsRegulationSecuritySmart ContractsTokenomicsWalletsWeb3 GamingOthers

Categories

AllBlockchainDappsDAOsDeFiNFTsRegulationSecuritySmart ContractsTokenomicsWalletsWeb3 GamingOthers
  1. Web3 Dictionary
  2. Security

Web3 Security

Master Web3 security - smart contract audits, private key management, phishing threats, rug pulls, and best practices for protecting on-chain assets.

Master Web3 security - smart contract audits, private key management, phishing threats, rug pulls, and best practices for protecting on-chain assets.

Launch Web3 Apps

Build secure dApps, tokens, DeFi & DAOs with a team focused on mainnet‑ready delivery.

Contact Us

Security Terms

26 Results

#

51% Attack

Security

An attack where a single entity controls over half of a blockchain’s mining power or stake to manipulate transactions.

Updated: Mar 19, 2026

A

Access Control

Security

System for restricting who can call specific smart contract functions based on permissions.

Updated: Mar 19, 2026

Admin Key Risk

Security

The risk that if admin keys are compromised, attackers can exploit smart contract functions to steal funds or break protocol.

Updated: Mar 19, 2026

B

Bug Bounty

Security

A reward program that pays security researchers for responsibly finding and reporting vulnerabilities.

Updated: Mar 29, 2026

D

Digital Signature

Security

Cryptographic proof that you authorized a transaction, created with your private key and verified with your public key.

Updated: Mar 19, 2026

Double-Spend

Security

An attack where someone attempts to spend the same cryptocurrency twice.

Updated: Mar 19, 2026

E

Entropy

Security

A measure of randomness or unpredictability, critical for cryptographic key generation and security.

Updated: Mar 19, 2026

Exploit

Security

A deliberate attack using code vulnerabilities to steal funds or break protocol functionality.

Updated: Mar 19, 2026

F

Front-Running

Security

A transaction ordering attack where someone submits a transaction before a victim’s to profit from the victim’s trade.

Updated: Mar 19, 2026

H

Hash

Security

A cryptographic function that converts any data into a fixed-size unique fingerprint.

Updated: Mar 29, 2026

Honeypot

Security

A malicious smart contract that allows users to buy tokens but prevents them from selling, trapping their funds.

Updated: Mar 19, 2026

M

Multisig (Multi-Signature Wallet)

Security

Wallet or smart contract requiring multiple signatures from different private keys to authorize transactions.

Updated: Mar 29, 2026

Multisig Security

Security

Security model using multiple signatures to authorize transactions, preventing single points of failure.

Updated: Mar 19, 2026

O

Oracle Manipulation

Security

Attacking price feed oracles to artificially manipulate smart contract decisions.

Updated: Mar 29, 2026

P

Phishing

Security

Social engineering attacks designed to steal private keys or wallet approvals.

Updated: Mar 29, 2026

Public Key

Security

Cryptographic key derived from private key that enables others to verify your transaction signatures.

Updated: Mar 29, 2026

Public Key Cryptography

Security

A cryptographic system using paired keys: public key for encryption/verification, private key for decryption/signing.

Updated: Mar 19, 2026

R

Reentrancy

Security

Smart contract vulnerability where recursive calls allow draining funds before state updates.

Updated: Mar 29, 2026

Replay Attack

Security

Attack reusing a valid transaction from one blockchain on another blockchain.

Updated: Mar 29, 2026

Rug Pull

Security

A scam where developers abandon a project after raising funds or draining protocol liquidity.

Updated: Mar 19, 2026

S

Sandwich Attack

Security

A front-running variant where an attacker places transactions before and after a victim's to manipulate price and profit.

Updated: Mar 19, 2026

Slashing

Security

A penalty mechanism where validators lose staked cryptocurrency for misbehavior or protocol violations.

Updated: Mar 29, 2026

Smart Contract Audit

Security

A professional security review of code to identify vulnerabilities, bugs, and potential exploits.

Updated: Mar 29, 2026

Smart Contract Risk

Security

Potential for bugs, exploits, or logical errors in smart contract code to cause loss of funds.

Updated: Mar 29, 2026

Sybil Attack

Security

An attack where one entity controls multiple identities to gain disproportionate influence in a decentralized system.

Updated: Mar 29, 2026

V

Verification

Security

The process of confirming that smart contract source code matches the deployed bytecode on the blockchain.

Updated: Mar 29, 2026