Muni V KExploring Gnosis Safe: Your Comprehensive Guide to a Secure Multi-Signature WalletIntroductionOct 15, 2023Oct 15, 2023
In1inch Networkby1inchBalancer Pool with STA Deflationary Token IncidentAt least two Balancer multi-token pools were drained for more than $500k today by using a vulnerability in context of AMM and token with…Jun 29, 20202Jun 29, 20202
Shamshod RozikovPrivate Variables in Solidity are Not PrivateIn the realm of Ethereum smart contract development, the term “private” often leads to a fundamental misconception. Many developers…Oct 20, 2023Oct 20, 2023
Alex SherbuckTwo Ways of Forcing Ether into a ContractThe last article on Dissecting an Ethereum Honey Pot was successful so I’ve taken time to compile all known Solidity exploits and hacks…Mar 13, 2018Mar 13, 2018
InLoom NetworkbyGeorgios KonstantopoulosHow to Secure Your Smart Contracts: 6 Solidity Vulnerabilities and how to avoid them (Part 1)In a previous post we discussed the future of Ethereum’s scalability by analyzing the concepts presented at Devcon3. Let’s take a moment…Jan 8, 20188Jan 8, 20188
Eric BanisadrHow $800k Evaporated from the PoWH Coin Ponzi Scheme OvernightThree days ago, 4chan’s /biz/ banded together and created a cryptocurrency Ponzi scheme: Proof of Weak Hands Coin. They advertised it as a…Feb 1, 20186Feb 1, 20186
PeckShieldNew batchOverflow Bug in Multiple ERC20 Smart Contracts (CVE-2018–10299)Built on our earlier efforts in analyzing EOS tokens, we have developed an automated system to scan and analyze Ethereum-based (ERC-20)…Apr 22, 201816Apr 22, 201816
InChain.Cloud company blogbyTony KentParity Multisig Hacked. AgainYesterday, Parity Multisig Wallet was hacked again: https://paritytech.io/blog/security-alert.htmlNov 8, 201710Nov 8, 201710
In0xMantlebyMantle NetworkSolidity Series Part 3: Call vs DelegatecallCall and Delegatecall are both very commonly used in smart contract development, though they look similar and accept very similar…May 17, 20231May 17, 20231
Gustavo (Gus) GuimaraesReentrancy Attack On Smart Contracts: How To Identify The Exploitable And An Example Of An Attack…To code smart contracts is certainly not a free picnic. A bug introduced in the code costs money and most likely not only your money but…May 25, 201710May 25, 201710