Perma-brick UUPS proxies with this one trick (devs hate this!) | iosiro
iosiro disclosed a UUPS proxy vulnerability to several teams, affecting over $50m in assets. This post details the technical details and the disclosure to OpenZeppelin.
crytic/building-secure-contracts: Guidelines and training material to write secure smart contracts
Guidelines and training material to write secure smart contracts - GitHub - crytic/building-secure-contracts: Guidelines and training material to write secure smart contracts
function renderKatex(element) { renderMathInElement(document.body, { delimiters: [ { left: '$$', right: '$$', display: true }, { left: '$', right: '$', display: false }, { left: '\\(', right: '\\)', display: false }, { left: '\\[', right: '\\]', display: true } ], throwOnError: false }); } \[ \] You’ll find the complete code of this chapter in this Github branch.
First Swap # In this milestone, we’ll build a pool contract that can receive liquidity from users and make swaps within a price range.
Stay current with latest DeFi/NFT events, hacks & innovations from around the globe. Don't fall behind! Click to read HashingBits, by QuillAudits, a Substack publication with hundreds of readers.
Learn about Merkle tree and merkle proof using Solidity.
Code: https://solidity-by-example.org/app/merkle-tree
Remix IDE: http://remix.ethereum.org
Solidity: https://solidity.readthedocs.io
Follow on Twitter: @ProgrammerSmart https://twitter.com/ProgrammerSmart
Website: https://smartcontractprogrammer.com
TradFi, Meet DeFi: Breaking Down the Economics of DeFi Hacks
Life of a DeFi developer: Say `gm`. Scroll crypto twitter and commiserate about the bear market. Architect new and complex financial and governance systems. Their robustness is so vitally critical
London Blockchain Security meetup #001 Dirk Brink is a Tech Lead at Graphcore and bug bounty hunter at Immunefi. He studied Electrical and Electronic Enginee...
Signing and Verifying Ethereum Signatures | Codementor
In this article, let's look at how you can perform off-chain computation using Ethereum signatures. Cryptographic signatures can be used to validate the origin and integrity of messages. Then, we'll examine real-life use cases of off-chain computation such as decentralized exchanges, state channels, and meta transactions.
fravoll/solidity-patterns: A compilation of patterns and best practices for the smart contract programming language Solidity
A compilation of patterns and best practices for the smart contract programming language Solidity - fravoll/solidity-patterns: A compilation of patterns and best practices for the smart contract pr...
iskdrews/awesome-solidity-gas-optimization: Best resources for Solidity gas optimizations ⛽
Best resources for Solidity gas optimizations ⛽. Contribute to iskdrews/awesome-solidity-gas-optimization development by creating an account on GitHub.
matter-labs/awesome-zero-knowledge-proofs: A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).
A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP). - matter-labs/awesome-zero-knowledge-proofs: A curated list of awesome things related to learning Zero-Knowledge Pr...
Language feature: disallow state-changing effects after an external call by default · Issue #12996 · ethereum/solidity
Abstract Generally disallowing state-changing effects after an external function call and enabling the possibility to mark functions that specifically do this. Motivation I started this discussion ...
saeidshirazi/Awesome-Smart-Contract-Security: A curated list of Smart Contract Security materials and resources For Researchers
A curated list of Smart Contract Security materials and resources For Researchers - saeidshirazi/Awesome-Smart-Contract-Security: A curated list of Smart Contract Security materials and resources F...
How to Steal $100M from Flawless Smart Contracts — PWNING
My blockchains adventure continues! This time I protected Moonbeam network by disclosing a critical design flaw, safeguarding more than $100M assets at risk in various DeFi projects. I was awarded the maximum reward amount of their bug bounty program on Immunefi, $1M, and $50k bonus from Moonwell (I guess that’s also one of the top 10 highest bug bounties?)
“There are some extremely successful bounty hunters in web3.
However, nobody tells you how they do it.
Until now.
Here is how you can become a bug bounty millionaire.
🧵👇”
Catching Weird Security Bugs in Solidity Smart Contracts with Invariant Checks | The Rekt Blog
Contract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed the use of Solidity assertions to check contract invariants. This article expands on the use of invariants and provides a couple of additional examples. An interesting feature of invariant checking on the bytecode level is …