Bug exploits are used to attack in the form of a program, they are used to take advantage of any system’s vulnerabilities in order to expose a particular system. Typically Bug Exploits are run by bitter people with intention, if enabling them it’ll lead to them gaining access to the system or run a (DDoS) Denial-of-Service attacks. Typically Bug Exploits are run by bitter people with intention. It is important that developers to subject their project to higher level of security and rigid testnet before they are rolled out to their mainnet for public use. With that being said if they do not secure their projects with high security it could lead to massive loss of funds, widespread disruption of services also time-sensitive contracts, that are integrated into cryptocurrency markets and exchanges.