How to Beat an Ethereum Sweeper Script and Recover Your Assets | MyCrypto Blog
Security
How to Steal $100M from Flawless Smart Contracts — PWNING
My blockchains adventure continues! This time I protected Moonbeam network by disclosing a critical design flaw, safeguarding more than $100M assets at risk in various DeFi projects. I was awarded the maximum reward amount of their bug bounty program on Immunefi, $1M, and $50k bonus from Moonwell (I guess that’s also one of the top 10 highest bug bounties?)
EVM Codes
An interactive reference to Ethereum Virtual Machine Opcodes
Joran Honig on Twitter
“There are some extremely successful bounty hunters in web3.
However, nobody tells you how they do it.
Until now.
Here is how you can become a bug bounty millionaire.
🧵👇”
Catching Weird Security Bugs in Solidity Smart Contracts with Invariant Checks | The Rekt Blog
Contract invariants are properties of the program program state that are expected to always be true. In my previous article I discussed the use of Solidity assertions to check contract invariants. This article expands on the use of invariants and provides a couple of additional examples. An interesting feature of invariant checking on the bytecode level is …
Raz0r/semgrep-smart-contracts: Semgrep rules for smart contracts based on DeFi exploits
Semgrep rules for smart contracts based on DeFi exploits - Raz0r/semgrep-smart-contracts: Semgrep rules for smart contracts based on DeFi exploits
razzorsec/AuditorsRoadmap
Contribute to razzorsec/AuditorsRoadmap development by creating an account on GitHub.
The Ultimate Smart Contract Auditing Guide
A Guide on How to Start and Common Bugs you can Find, All in 13 Quick Parts
The Immunefi team at the Off The Chain Con
Alejandro Munoz-McDonald, Smart Contract Triager at Immunefi, did a presentation on the world's largest bug bounty payouts that were done through Immunefi's ...
tamjid0x01/awesome-smartcontract-hacking: Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome.
Here we collect and discuss for Smart contract security & Blockchain researches and tools - contributions are welcome. - tamjid0x01/awesome-smartcontract-hacking: Here we collect and discus...
uni-v3-twap-manipulation/cost-of-attack.pdf at master · euler-xyz/uni-v3-twap-manipulation
Contribute to euler-xyz/uni-v3-twap-manipulation development by creating an account on GitHub.
eugenioclrc/secureum-a-maze-x-challenges
Contribute to eugenioclrc/secureum-a-maze-x-challenges development by creating an account on GitHub.
Drift Protocol Technical Incident Report — 2022/05/11
Background
Latent Bugs in Billion-Plus Dollar Code
You are probably safe, but be aware…
Writing Upgradeable Contracts - OpenZeppelin Docs
solidity-hacks/src at master · Perelyn-sama/solidity-hacks
Solidity Security: Comprehensive list of known attack vectors and common anti-patterns
This post aims to be a relatively in-depth and up-to-date introductory post detailing the past mistakes that have been made by Solidity...
So you want to use a price oracle - Paradigm
In late 2019, I published a post titled “Taking undercollateralized loans for fun and for profit”. In it, I described an economic attack on Ethereum dApps that rely on accurate
Taking undercollateralized loans for fun and for profit
Price manipulation, now with 100% more blockchain
Price Oracle Manipulation
In this article we look at type of economic attack on DeFi projects in the form of manipulation of price oracles. On Ethereum, where everything is a smart contract, so too are price oracles. As such…
Pricing LP tokens | Warp Finance hack | cmichel
This article explores the pricing of liquidity pool (LP) tokens and discusses the recent Warp Finance hack that is closely related to it…
QuillAudits Team – Medium
Read writing from QuillAudits Team on Medium. Smart Contract Auditing Experts , Making DeFi secure . audits@quillhash.com. Every day, QuillAudits Team and thousands of other voices read, write, and share important stories on Medium.
Price Manipulation Attacks From First Principles
Commit Reveal Scheme on Ethereum
Hiding actions and generating random numbers
The Dangers of Token Integration
Even the most popular tokens can be deceiving, so understanding risks and common pitfalls when integrating them is fundamental in Ethereum’s composable world...
A Guide to Reproducing Ethereum Exploits: Fei Protocol
This guide, written by whitehat Lucash-dev for Immunefi, will help you set up a local environment and reproduce the Fei Protocol exploit…
0xalpharush/awesome-MEV-resources: Get up to speed on Maximum Extractable Value
Get up to speed on Maximum Extractable Value. Contribute to 0xalpharush/awesome-MEV-resources development by creating an account on GitHub.
w3bs3c.com - Web3 Security 101s
A searchable curated repository of Web3 security 101s brought to you buy https://twitter.com/web3sec
research/research-seminars.md at master · protocol/research
Research at Protocol Labs. Contribute to protocol/research development by creating an account on GitHub.
sec-bit/awesome-buggy-erc20-tokens: A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected
A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected - sec-bit/awesome-buggy-erc20-tokens: A Collection of Vulnerabilities in ERC20 Smart Contracts With Tokens Affected