BlockChain

308 bookmarks
Custom sorting
Joran Honig on Twitter
Joran Honig on Twitter
“There are some extremely successful bounty hunters in web3. However, nobody tells you how they do it. Until now. Here is how you can become a bug bounty millionaire. 🧵👇”
·twitter.com·
Joran Honig on Twitter
Catching Weird Security Bugs in Solidity Smart Contracts with Invariant Checks | The Rekt Blog
Catching Weird Security Bugs in Solidity Smart Contracts with Invariant Checks | The Rekt Blog
Contract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed the use of Solidity assertions to check contract invariants. This article expands on the use of invariants and provides a couple of additional examples. An interesting feature of invariant checking on the bytecode level is …
·blog.mythx.io·
Catching Weird Security Bugs in Solidity Smart Contracts with Invariant Checks | The Rekt Blog
Constant Product AMM Math | DeFi
Constant Product AMM Math | DeFi
Math for constant product AMM (automated market maker). 0:00 - Intro 2:38 - Swap - How many tokens to return in a trade? 5:53 - Add liquidity - How many shares to mint? - Answer 6:20 - Add liquidity - Constraints 11:20 - How many shares to mint? 12:54 - How to measure liquidity? 16:04 - Simplify equation for shares to mint 22:05 - Remove liquidity - How many tokens to withdraw? Notes https://github.com/t4sk/notes #Solidity #SmartContract #Ethereum #スマートコントラクト Take a course https://www.smartcontract.engineer/ Follow https://twitter.com/ProgrammerSmart https://discord.gg/bt8FK2wkcW https://t.me/smartcontractprogrammer https://smartcontractprogrammer.com
·youtube.com·
Constant Product AMM Math | DeFi
razzorsec/AuditorsRoadmap
razzorsec/AuditorsRoadmap
Contribute to razzorsec/AuditorsRoadmap development by creating an account on GitHub.
·github.com·
razzorsec/AuditorsRoadmap
The Immunefi team at the Off The Chain Con
The Immunefi team at the Off The Chain Con
Alejandro Munoz-McDonald, Smart Contract Triager at Immunefi, did a presentation on the world's largest bug bounty payouts that were done through Immunefi's ...
·youtube.com·
The Immunefi team at the Off The Chain Con
tamjid0x01/awesome-smartcontract-hacking: Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.
tamjid0x01/awesome-smartcontract-hacking: Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.
Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome. - tamjid0x01/awesome-smartcontract-hacking: Here we collect and discus...
·github.com·
tamjid0x01/awesome-smartcontract-hacking: Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.
bt3gl-labs/Blockchains-AMMs-and-MEV: Notes, scripts, code through my journey into stateful blockchains, MEV, DeFi, day trading, DEXs, etc. - by bt3gl
bt3gl-labs/Blockchains-AMMs-and-MEV: Notes, scripts, code through my journey into stateful blockchains, MEV, DeFi, day trading, DEXs, etc. - by bt3gl
Notes, scripts, code through my journey into stateful blockchains, MEV, DeFi, day trading, DEXs, etc. - by bt3gl - bt3gl-labs/Blockchains-AMMs-and-MEV: Notes, scripts, code through my journey into ...
·github.com·
bt3gl-labs/Blockchains-AMMs-and-MEV: Notes, scripts, code through my journey into stateful blockchains, MEV, DeFi, day trading, DEXs, etc. - by bt3gl
Phan Sơn Tự – Medium
Phan Sơn Tự – Medium
Read writing from Phan Sơn Tự on Medium. A lucky guy was born in the Age of Cryptocurrency Boom. Every day, Phan Sơn Tự and thousands of other voices read, write, and share important stories on Medium.
·medium.com·
Phan Sơn Tự – Medium
The EVM Handbook
The EVM Handbook
A curated list of EVM resources for aspiring shadowy super coders.
·noxx3xxon.notion.site·
The EVM Handbook
The Hitchhiker's Guide to Ethereum - Delphi Digital
The Hitchhiker's Guide to Ethereum - Delphi Digital
Ethereum's roadmap is a lot to keep track of. This is your technical crash-course on everything from danksharding to KZGs to statelessness and so much more.
·members.delphidigital.io·
The Hitchhiker's Guide to Ethereum - Delphi Digital
Solana Smart Contracts: Common Pitfalls and How to Avoid Them
Solana Smart Contracts: Common Pitfalls and How to Avoid Them
Hey everyone! We're Neodyme, a team of security researchers who have spent the past ~12 months inspecting the internals of the Solana blockchain. Over the course of our research, we discovered and reported several vulnerabilities in the Solana core code, ultimately helping to secure the chain against attackers. A few months ago, we were sponsored by the Solana Foundation to also set up a peer review system for smart contracts that are important for the Solana ecosystem. Since then, we've been working with developers from a range of projects building on Solana to assist them in securing their contracts. We've audited dozens of contracts, using our unique experience with Solana to uncover many exploitable bugs. During these audits, we've discovered intricate vulnerabilities in some of the major projects on the chain, and our reviews helped prevent the potential theft of roughly USD 1 billion worth of assets. However, as Solana is such a rapidly growing ecosystem, we have nowhere near enough capacity to manually audit every new contract to our standards. Instead, we'll be sharing some of the knowledge we've built over the course of our many audits in this blog, in hopes that developers and other auditors will be able to make use of it. In this post, we want to raise awareness about the five most common vulnerabilities in Solana contracts that we keep finding during our audits. We'll keep the vulnerability descriptions short and concise and provide a simplified example as well as a TL;DR for each vulnerability so that you can easily reference them while coding.
·blog.neodyme.io·
Solana Smart Contracts: Common Pitfalls and How to Avoid Them
Sigma Prime
Sigma Prime
Blockchain, Cybersecurity and Complex Systems
·blog.sigmaprime.io·
Sigma Prime