
Top 10 Web3 Security Threats in 2025 and How to Mitigate Them
- web3-security
- blockchain-threats
- bridge-vulnerabilities
- private-key-management
- mev-exploitation
- phishing-web3
- supply-chain-attacks
- smart-contract-bugs
- production-ready
- defi-security
The Web3 security landscape has matured considerably since the early DeFi boom. Teams are deploying smarter contracts, running formal verification, and spending more on audits. Yet the total value lost to exploits continues to be measured in billions annually.
The reason is not that defenses are ineffective. It is that the attack surface keeps expanding. As protocols grow more complex, as cross-chain bridges proliferate, and as the developer ecosystem attracts more participants of varying skill levels, new vulnerabilities surface faster than the industry can respond.
This post covers the 10 most significant Web3 security threats active in 2025 and gives you a concrete mitigation strategy for each.
1. Bridge Vulnerabilities
Cross-chain bridges have become the single largest source of Web3 losses. The Ronin Network bridge ($625 million), the Wormhole bridge ($320 million), and the Nomad bridge ($190 million) are the three largest individual crypto hacks in history at the time of writing. All three were bridges.
Bridges are uniquely dangerous because they hold large concentrated reserves and their security models are inherently complex: they must verify events that happened on one chain and act on another, which requires off-chain validator infrastructure that introduces non-blockchain attack surfaces.
The Ronin Attack Anatomy
The Ronin bridge hack succeeded because an attacker compromised 5 of 9 validator keys. This threshold was sufficient to sign fraudulent withdrawals. Four of the compromised keys belonged to Sky Mavis (Axie Infinity's developer), and the fifth was controlled by Axie DAO - but Axie DAO had granted Sky Mavis temporary signing permissions to handle transaction volume, which had never been revoked.
The exploit was a combination of social engineering (the initial access was through a fake job offer PDF), key management failures, and governance oversight failure (the permission had been forgotten).
Mitigation
- Never use fewer than a 5-of-9 or similar high-threshold multi-sig for bridge validators
- Implement independent validator key management - validator operators must be truly independent
- Audit permission grants and revoke temporary permissions on schedule
- Implement transaction value rate limits and mandatory delays for large withdrawals
- Use zkProof-based bridges (LayerZero, zkBridge) where possible - they have stronger security guarantees than multi-sig validator sets
2. Private Key Management Failures
Private key compromise is responsible for a disproportionate share of Web3 losses, and much of it is preventable. The Wintermute hack ($160 million) in 2022 resulted from a compromised admin private key generated with a known-vulnerable vanity address tool (Profanity). The attacker precomputed the private key from the address.
Not all private key failures are this sophisticated. Hot wallets stored in plaintext environment variables, seed phrases pasted in Slack messages, and cloud provider credential exposure are still common failure modes.
Mitigation
- Never use admin keys without hardware security modules (HSMs) or hardware wallets in production
- Never store private keys in environment variables, code repositories, or messaging platforms
- Use multi-signature wallets (Gnosis Safe) for all contract admin functions - require at least 2-of-3 for routine operations, 3-of-5 for high-value operations
- Rotate keys on a schedule and immediately upon any personnel change in the team
- Audit key generation tools before use. Profanity was a known weak tool; teams using it had access to security disclosures they ignored
- Implement key access logging and alerting for any admin key usage
3. Phishing and Social Engineering
Phishing remains the most reliable attack vector against Web3 teams and users because it targets humans rather than code.
Web3 phishing has evolved beyond simple fake websites. Modern attacks include:
- Fake job offers containing malware (used in the Ronin hack)
- Discord server admin account compromises leading to fake NFT mint announcements
- Fake wallet update notifications draining users who sign malicious approval transactions
- Cloned protocol front-ends with malicious transaction parameters
- Impersonation of support staff in Discord and Telegram
The 2022 Bored Ape Yacht Club Discord hack cost users approximately $360,000 in NFTs stolen through a phishing link posted by a compromised admin account.
Mitigation
For protocol teams:
- Enforce hardware security keys (YubiKey) for all admin accounts on Discord, Twitter, GitHub, and hosting platforms
- Implement domain monitoring to detect clone sites
- Educate users explicitly: your protocol will never DM them first, will never ask for a seed phrase, and will never have "exclusive limited-time mints" announced in Discord
- Use transaction simulation tools (Tenderly, Pocket Universe) in your front-end to show users exactly what a transaction will do before they sign
For users:
- Bookmark protocol URLs directly - never click links from social media or messaging platforms
- Use a browser extension that flags known phishing domains (MetaMask's warning system, Pocket Universe, Revoke.cash)
- Maintain a separate wallet for interactions with new or untested protocols
- Review and revoke token approvals regularly using revoke.cash
4. Smart Contract Bugs and Logic Errors
Even with the audit industry maturing, smart contract bugs continue to cause major losses. The attacks are becoming more sophisticated. Euler Finance was exploited for $197 million in March 2023 through a complex attack on its donation mechanism that interacted with its liquidation logic in an unexpected way. The vulnerability passed multiple audits.
This highlights an important truth: audits catch known vulnerability patterns reliably. They are less effective at catching novel logic errors that only manifest through complex multi-step interactions.
Mitigation
- Do not rely on a single audit. Run multiple independent audits for high-TVL protocols
- Invest in formal verification for core protocol invariants
- Run comprehensive fuzzing campaigns before and after audit
- Implement TVL caps for early deployment. Launch with a hard limit on locked value and remove it as confidence builds
- Write threat models before coding, not after
5. MEV (Maximal Extractable Value) Exploitation
MEV is profit extracted by block producers (or searchers in the PBS system) from their ability to reorder, include, or exclude transactions within blocks. The most common MEV attacks affecting users are sandwich attacks and frontrunning.
In a sandwich attack, a bot detects your pending swap in the mempool, places a buy order before yours to move the price up, lets your transaction execute at the worse price, then sells immediately after. The DEX user pays the bot's profit through worse execution.
In 2022, MEV extraction on Ethereum exceeded $600 million. For protocols with large single-sided liquidity pools, MEV creates systematic disadvantages for retail users.
Mitigation
For protocol builders:
- Implement minimum time-weighted swap prices to prevent profitable sandwiching
- Require transactions to specify a maximum slippage tolerance and revert if exceeded
- Consider commit-reveal schemes for sensitive operations
- Integrate with MEV protection services (Flashbots Protect, MEV Blocker) in your front-end RPC configuration
For trading infrastructure:
- Use private mempools (Flashbots) for large transactions
- Batch trades through aggregators that implement MEV protection
- Break large swaps into smaller transactions over time
6. Supply Chain Attacks
Supply chain attacks target the software dependencies that Web3 projects use rather than the protocol code itself. The impact can be broad because a single compromised package can affect hundreds of projects simultaneously.
In December 2022, the @ledgerhq/connect-kit package was compromised when an attacker used a phishing attack to gain access to a former Ledger employee's npm account. The malicious version drained wallets on any site using the package. Affected protocols included SushiSwap, Revoke.cash, Zapper, and others.
Earlier in the same year, the node-ipc package author injected malware that deleted files on systems in Russia or Belarus. While not specifically a crypto attack, it demonstrated that npm package maintainers can push malicious updates to millions of projects.
Mitigation
- Lock dependency versions explicitly. Use
package-lock.jsonorpnpm-lock.yamland commit them to version control - Audit all package updates before deploying. Do not auto-update dependencies in production
- Use Subresource Integrity (SRI) for CDN-loaded scripts in your front-end
- Implement front-end monitoring that alerts on unexpected script loading
- Conduct regular dependency audits with tools like
npm audit, Snyk, or Socket.dev - Minimize dependency count. Every package is a potential supply chain risk
7. Governance and DAO Attacks
Governance attacks have become more sophisticated since the Beanstalk hack of 2022. In 2023 and 2024, several protocols suffered governance attacks through lower-profile mechanisms: gradual accumulation of governance tokens, timing attacks during low-participation voting windows, and manipulation of delegation mechanisms.
The Compound Finance governance incident in 2022 - where a user accidentally passed a proposal that redirected $68 million in COMP tokens to a single address - highlighted that governance failures can be accidental as well as malicious.
Mitigation
- Implement timelocks of at least 48 hours between proposal passage and execution
- Set minimum quorum thresholds that are genuinely representative
- Monitor governance proposal creation in real time. Alert stakeholders immediately when new proposals are submitted
- Require a meaningful proposal deposit that is lost if the proposal is rejected as malicious
- Build a guardian multi-sig that can pause or veto clearly malicious proposals during the timelock window
8. DNS Hijacking
DNS hijacking involves an attacker taking control of a protocol's domain name and redirecting users to a malicious front-end. Once a user connects their wallet to the hijacked site, any transaction they sign may drain their funds.
The Curve Finance DNS hijack in August 2022 redirected users to a cloned site that prompted wallet connections and drained approximately $570,000 before being caught. The attack worked through a compromise of Curve's domain registrar account.
Mitigation
- Enable domain registrar two-factor authentication and use a hardware security key, not SMS
- Use registrar lock (domain transfer lock) to prevent unauthorized transfers
- Consider using ENS (Ethereum Name Service) or IPFS-hosted front-ends as fallbacks
- Implement DNS monitoring and alert on any DNS record changes
- Display your protocol's IPFS CID publicly so technically sophisticated users can verify they are on the real site
- Consider DNSSEC deployment to cryptographically sign DNS records
9. API Key and Credentials Leakage
Web3 protocols depend on external APIs: RPC node providers, oracle APIs, analytics platforms, and infrastructure providers. Leakage of these API keys can enable attackers to run node queries at your expense, manipulate monitoring, or - in worst cases - access administrative infrastructure.
In 2022, a major NFT platform had their Alchemy API key exposed in a public GitHub repository. While the incident did not result in direct user fund loss, the attacker used the key to run substantial queries, degrading service for legitimate users.
Beyond API keys, AWS credentials, GitHub tokens, and CI/CD secrets exposed through public repositories are a persistent problem in the Web3 developer community, partly because the culture of open-source development sometimes collides with proper secrets management.
Mitigation
- Never commit secrets to version control. Use pre-commit hooks (GitLeaks, truffleHog) that scan for exposed credentials before every commit
- Store all secrets in a secrets manager (AWS Secrets Manager, HashiCorp Vault, or GitHub Actions secrets)
- Rotate all API keys on a regular schedule and immediately when a team member with access departs
- Use scoped API keys with minimum necessary permissions
- Monitor API key usage for anomalies - unusual call volumes or calls from unexpected IP ranges
10. Insider Threats
Insider threats receive less attention in Web3 security discussions than smart contract vulnerabilities, but they account for a meaningful share of losses. The Mango Markets manipulation in 2022 - where Avraham Eisenberg used $10 million to manipulate the price of MNGO tokens and drain $117 million from the protocol - was executed by someone who publicly announced what he had done, arguing it was legal.
More conventional insider threats include disgruntled employees with admin key access, contractors who retain access after engagement end, and team members at small protocols who have unilateral access to treasury multi-sigs.
Mitigation
- Apply minimum necessary access principles. Not every team member needs multi-sig access or admin key access
- Require multiple signatures for any treasury or admin operation - single-signer admin is unacceptable
- Offboard access immediately and comprehensively when team members leave. This includes all wallets, admin accounts, API keys, and repository access
- Conduct background checks for team members with significant access to treasury or admin infrastructure
- Maintain detailed access logs and review them regularly
- For significant treasury operations, require out-of-band verification (video call with all signers visible) before execution
Building a Layered Security Posture
No single defense stops all Web3 attacks. Security comes from layered defenses where each layer catches what others miss.
The layers are:
- Secure architecture (threat modeling, minimal attack surface)
- Secure development (following best practices, security-aware coding)
- Automated analysis (Slither, Mythril, Echidna fuzzing)
- External audit (manual code review by specialized firm)
- Operational security (key management, access control, monitoring)
- Incident response (plan, tools, and team ready before launch)
Gaps in any layer create exposure. A perfectly audited smart contract is worthless if the admin multi-sig is controlled by a single team member's laptop.
At P2C, we build this layered approach into every blockchain engagement. Our ISO 27001:2022 certification reflects our commitment to information security management across the full development lifecycle - from initial architecture through deployment and beyond.
Key Takeaways
- Bridge vulnerabilities are the largest single source of Web3 losses. Use high-threshold multi-sigs and value rate limits.
- Private key management failures are preventable. All admin functions must use hardware security and multi-signature schemes.
- Supply chain attacks are growing. Lock dependency versions, audit updates, and minimize package counts.
- MEV extraction disadvantages your users. Implement slippage protection and consider MEV-resistant front-end RPC configurations.
- DNS hijacking is underestimated. Secure your domain registrar account with hardware keys and enable DNSSEC.
- Insider threats require minimum-access policies, multi-sig requirements, and immediate offboarding procedures.
- Layered defense is the only viable security posture. No single control stops all threats.
Frequently Asked Questions
Is it possible to build a Web3 protocol that is fully immune to all these threats? No. Perfect security does not exist. The goal is to raise the cost of attacks to the point where they are economically irrational, and to minimize damage when breaches do occur through monitoring, incident response, and insurance.
How often should we conduct security reviews? Any code change should trigger at least automated analysis (Slither, unit tests). Significant feature additions require re-audit of the affected components. A full annual security review is appropriate for protocols past a defined TVL threshold.
What Web3 security insurance options exist? Nexus Mutual, InsurAce, and Sherlock's insurance product provide coverage for smart contract bugs. Policies have coverage limits, exclusions, and require evidence of security practices (audits, monitoring). Coverage is improving but remains limited relative to TVL in most protocols.
How do we handle a bridge vulnerability responsibly? Immediately contact security researchers and the affected team through responsible disclosure channels. Coordinate a white hat rescue operation if funds can be moved to safety before exploitation. Engage law enforcement for cross-chain tracing. Do not publicly announce until a mitigation plan is in place.


