💼Vulnerabilities
The Vulnerabilities module in Menaxa helps you track, analyze, and understand security weaknesses in both Web2 and Web3 applications.
This isn’t just a list — it’s a learning layer, designed to help developers, auditors, researchers, and founders stay informed about how real vulnerabilities work, how they’re exploited, and how to prevent them.

🔍 What This Module Covers
Menaxa tracks known vulnerability patterns across two major ecosystems:
Smart Contract Vulnerabilities
Blockchain-specific issues like mint logic flaws, oracle manipulation, and access control bypass.
Web Application Vulnerabilities
Traditional Web2 risks such as broken authentication, injection flaws, CORS misconfigurations, etc.
Every entry is written for humans — with real explanations, examples, and actionable takeaways.
📊 Top-Level Metrics
Metric
Description
Total Vulnerabilities
Combined count of known Web2 + Web3 vulnerabilities
Smart Contract
Count of blockchain-specific security issues
Web
Count of web application vulnerabilities
These are not bug bounty submissions or live exploits — they’re the fundamental flaws behind most attacks in the wild.

🗃️ Vulnerability List
You’ll see a categorized, filterable table with the following fields:
Field
Description
Name
Name of the vulnerability (e.g. “Access Control Issues”)
Type
Ecosystem tag: Smart Contract or Web
Category
Grouping by functional impact (e.g. Logic, Authorization, Input Validation)
Description
One-liner explaining the risk and outcome of exploitation
You can:
Use the search bar to find vulnerabilities by name or keyword
Filter by type (Smart Contract, Web, or All)
Paginate to browse 100+ entries
🔎 Click-to-Expand Vulnerability Viewer
Click on any vulnerability name to open a detailed view. This shows:
Section
What it includes
Type
Indicates whether it’s a Web or Smart Contract issue
Category
Technical grouping (e.g. Auth Flaws, Storage Risks, Business Logic)
Short Description
One-sentence summary of what the issue causes
Detailed Description
How the vulnerability works, why it matters, and real-world examples
Example
Code snippet or pattern that demonstrates the issue in context

🧠 Use Cases
Developers: Learn what patterns to avoid and how to structure safe logic
Auditors: Reference for checklist creation or client education
Researchers: Study edge cases and variations of known vulnerabilities
Founders: Understand the risks that could impact product or user safety
Last updated