Blockchain vulnerability refers to anything that can be leveraged by a hacker to exploit the protocol.
One of the most common is centralization risk. Centralization often creates a single point of failure which hackers can exploit to gain access to an entire network.
Logical issue vulnerabilities require the restructuring of the code and can refer to errors. Reentrancy attacks are hacks that exploit logical issues. An attacker can trick a smart contract into sending funds that have already been sent.
Gas optimization is important as projects grow. The gas needed to validate transactions may increase so large that new blocks are no longer able to be validated.
A gas optimization finding in a CertiK security audit identifies areas where the amount of gas can be reduced without affecting the operation of the code.
Vulnerabilities arise from the external endpoints at which blockchains intersect, known as oracles. Information transmitted by oracles and their smart contracts can be exploited by hackers.
Cross-chain bridges have arisen as a vital infrastructure for users to move between blockchains. Vulnerabilities can occur due to the differences in rules and organizations between chains.