Possible vulnerabilities in the Move program:

1) Developers should maintain a certain degree of security awareness;

2) For function permission issues, the caller needs to be authenticated;

3) Logic issues should be paid attention to when designing and implementing business logic;

4) When upgrading the module, you need to pay attention to the contract upgrade strategy, the code owner cannot be changed after the initial deployment, and the unfamiliar address will always have upgrade permissions after deployment.

By Beosin.