OlympixTime-Bandit Attacks: Understanding and Mitigating Blockchain ReorgsThis article delves into the mechanics of these blockchain reorganizations, exploring their potential impact on network security.4h ago
Patrick CollinsinCyfrinHow to Become a Smart Contract AuditorWe look at the roadmap to become a web3 security researcher, (sometimes called smart contract auditor) and tell you the exact steps to be…Jan 126
Mustafa AkbulutinCoinmonksSmart Contract Vulnerabilities Unveiled: Short Address AttackIn the realm of smart contracts, security vulnerabilities can arise from even the most subtle oversights. One such vulnerability is the…Aug 33Aug 33
BillDelving into the Security Implications of Fee Structure in a CDP protocolDiscover how borrowing and redemption fees help safeguard decentralized stablecoins and prevent exploit scenarios.2d ago2d ago
Mustafa AkbulutinCoinmonksSmart Contract Vulnerabilities Unveiled: Transaction Ordering Dependence (TOD)In the blockchain ecosystem, the order in which transactions are processed can have a significant impact on the outcome of those…Aug 181Aug 181
OlympixTime-Bandit Attacks: Understanding and Mitigating Blockchain ReorgsThis article delves into the mechanics of these blockchain reorganizations, exploring their potential impact on network security.4h ago
Patrick CollinsinCyfrinHow to Become a Smart Contract AuditorWe look at the roadmap to become a web3 security researcher, (sometimes called smart contract auditor) and tell you the exact steps to be…Jan 126
Mustafa AkbulutinCoinmonksSmart Contract Vulnerabilities Unveiled: Short Address AttackIn the realm of smart contracts, security vulnerabilities can arise from even the most subtle oversights. One such vulnerability is the…Aug 33
BillDelving into the Security Implications of Fee Structure in a CDP protocolDiscover how borrowing and redemption fees help safeguard decentralized stablecoins and prevent exploit scenarios.2d ago
Mustafa AkbulutinCoinmonksSmart Contract Vulnerabilities Unveiled: Transaction Ordering Dependence (TOD)In the blockchain ecosystem, the order in which transactions are processed can have a significant impact on the outcome of those…Aug 181
OlympixPenpie Exploit: A Technical Post-Mortem AnalysisA look at the Penpie exploit, where attackers stole over $27 million by exploiting a re-entrancy vulnerability on Ethereum and Arbitrum.2d ago
Cathrine WilliamsinCoinmonksA Step-by-Step Guide to Passive Income with Smart Contracts in 2024Smart contract development is at the heart of the decentralized revolution, reshaping industries by enabling trustless, automated, and…Aug 271
Marko JaureguiThe Pull-Over-Push Model in Solidity: A Secure Pattern for Fund WithdrawalsIn the world of Solidity development, security is paramount. Smart contracts handle significant amounts of value, and any vulnerability can…2d ago