PinnedLogesh NinCoinsBenchCOMMON VULNERABILITIES: REENTRANCY PART — IReentrancy is a vulnerability that can occur in smart contracts when they interact with other contracts. This vulnerability allows an…Mar 21Mar 21
PinnedLogesh NinCoinsBenchCOMMON VULNERABILITIES: REENTRANCY PART — IITo understand this concept please visit my previous post of COMMON VULNERABILITIES: REENTRANCY PART — IMar 21Mar 21
Logesh NinCoinsBenchCOMMON VULNERABILITIES: DEFAULT VISIBILITYIn Solidity, if you declare a state variable or function without explicitly specifying its visibility (i.e., public, internal, private, or…Mar 29Mar 29
Logesh NinCoinmonksUnveiling the $16 Million Exploit: Inside the CurioDAO BreachOn Tuesday, March 26, 2024, the Curio’s DAO smart contract was exploited for $16 million. A critical vulnerability involving voting power…Mar 27Mar 27
Logesh NinCoinsBenchCOMMON VULNERABILITIES: Uninitialized Storage VariablesUninitialized storage variables (state variables) bugs in Solidity occur when storage variables are accessed or used without being properly…Mar 25Mar 25
Logesh NinCoinsBenchCOMMON VULNERABILITIES: ACCESS CONTROLAccess control issues in Solidity refer to vulnerabilities related to improper management of permissions and privileges within smart…Mar 24Mar 24
Logesh NinCoinsBenchCOMMON VULNERABILITIES: Denial of Service (DoS)Denial of Service (DoS) attacks in the context of Solidity and blockchain refer to malicious activities aimed at disrupting the normal…Mar 24Mar 24
Logesh NinCoinsBenchSuper Sushi Samurai ExploitA contract that doesn’t check if the sender and recipient addresses are the same is vulnerable to an exploit similar to the Super Sushi…Mar 23Mar 23
Logesh NinCoinsBenchCOMMON VULNERABILITIES: UNCHECKED EXTERNAL CALLSThe “Unchecked External Calls” vulnerability refers to situations in Solidity smart contracts where external calls are made to other…Mar 22Mar 22