YEAR-END REPORT
2025
Fewer on-chain smart contract Solana exploits in 2025 (US$ 8mn) down from peak in 2022 (US$ 550mn), even as activity and TVL grew
163 Solana security reviews examined, spanning 1,669 recorded vulnerabilities
Average of 10 issues per audit, with 1.4 High or Critical vulnerabilities in each review
The most severe issues concentrate in business logic flaws, access control failures, and protocol design weaknesses
We spend most of the year reviewing Solana programs one code base at a time. Across that work, patterns emerge - how bugs cluster, which security practices help, and where things can still go wrong even after an audit - but those patterns rarely live in one place.
This report is our attempt to put structure around what we are seeing: to quantify what audits actually uncover on Solana, place that evidence next to publicly reported incidents on-chain, and connect both to the design and operational choices development teams were making.
The aim is to give builders, reviewers and ecosystem participants a shared reference point for how Solana security is evolving and where attention is likely to matter most in the next year.
We analyzed 163 Solana security audits drawn from a mix of publicly released reports and anonymized Sec3 review engagements. Together these reviews produced 1,733 findings, of which 1,669 qualified as vulnerability-level issues.
99.4% of audits in our dataset identified vulnerabilities
162 of 163 reviews identified at least one vulnerability
of reviews contained at least one medium-or-higher issue
of reviews contained at least one high-or-critical issue
of reviews contained at least one critical issue
Among findings with clear classifications (approximately 70% of the total dataset):
Serious issues overwhelmingly stem from Business Logic, Permissions, and Validation Errors rather than low level arithmetic or liveness problems. Top 3 categories increased from 82.5% → 85.5% of all severe findings.