Definition ∞ An inherited vulnerability is a security weakness present in a system due to flaws in its foundational components or dependencies. This type of susceptibility arises when a new protocol or application builds upon existing code, libraries, or standards that contain known or undiscovered security defects. Exploiting such a vulnerability can compromise the dependent system, even if its own code is robust. Developers must meticulously audit all upstream dependencies to mitigate these risks.
Context ∞ In crypto news, reports of security breaches often highlight inherited vulnerabilities, particularly in decentralized finance protocols that reuse audited or unaudited smart contract code. The reliance on established standards can inadvertently introduce risks if those standards are later found to have weaknesses. Preventing these issues requires continuous security audits and robust supply chain management for software components.