Atharva Deshpandeforatoo.hashnode.net·Jan 9, 2023Ethernaut Challenge Level 1Hey everyone, here is the second article of my series on Ethernaut journey. It's going well for now at least hahaha. NOTE: You don't need to read through the entire article if you are looking for some solution to your problem. Head down to the chall...Discuss·13 likes·58 readsEthernaut JourneySmart Contracts
Glory Praise EmmanuelforGlory Praise's Blogglorypraise.hashnode.net·Jan 14, 2023Vulnerability #2 - Reentrancy in SolidityReentrancy is a form of vulnerability that can happen in Solidity contracts when an external contract has the ability to call the main smart contract function repeatedly in order to drain its funds before the original call has ended. A reentrancy att...Discuss·10 likes·57 readsSmart Contract Security & Audit SeriesSolidity
Opeyemi AdewoleforBlockchain & Chilldliteofficial.hashnode.net·Feb 8, 20234 tools to 3x your productivity in Remix as a solidity developerIntroduction Every solidity developer used remix in writing smart contract code. Some developers still do. One of the reasons developers use remix is the interface it provides for interacting with deployed smart contracts. It takes a while and a good...Discuss·2 likes·129 readsSolidity
TutorialBoyforTUTORIALBOYtutorialboy24.hashnode.net·Apr 24, 2023The Unbounded Loops Vulnerability: Denial of ServiceUnbounded Loop Vulnerability: An unbounded loop vulnerability is a kind of security flaw that may arise in smart contracts when a loop lacks a defined maximum iteration limit. This implies that the loop can run indefinitely, potentially using up all ...Discuss#cybersecurity
Dipak kumar DasforAddictive Hackersd1pakda5.hashnode.net·Apr 22, 2023Introduction To Smart Contract Auditing: Why It's ImportantSmart contracts are self-executing contracts that are coded with specific conditions, rules, and terms. They are built on blockchain technology, which allows for a decentralized and transparent way of executing agreements. Smart contracts work by aut...Discuss·108 readsSmart Contract SecurityWeb3
Awokunle SamsonforSamson's blogtrysam.hashnode.net·Apr 5, 2023Smart Contract Vulnerability ChecklistA smart contract is a computer program that executes automatically when certain predefined conditions are met. While smart contracts offer numerous advantages, they can also be vulnerable to certain types of attacks or exploits. Here are some common ...Discuss·33 readsSmart Contracts
Awokunle SamsonforSamson's blogtrysam.hashnode.net·Mar 28, 2023LendHub Hack's $6M loss in Jan 2023Designed for cross-chain lending, LendHub suffered a loss of about $6 million worth of crypto assets on January 12, 2023, after a hacker exploited a vulnerability in its smart contract. The flaw occurred due to an oversight in removing a deprecated t...Discusssmart contract audit
Aditya BajajforAditya Bajajadityabajaj.hashnode.net·Mar 21, 2023Ethernaut - Walkthrough for Noobs - 9 - King👑This is a good albeit easy challenge since this begins to teach us regarding the optimal methods to send ether to others in a contract. Objective: The challenge below represents a very simple game: whoever sends it an amount of ether that is larger ...DiscussEthernaut - Walkthrough for Noobs 2Articles1Week
Aditya BajajforAditya Bajajadityabajaj.hashnode.net·Mar 20, 2023Ethernaut - Walkthrough for Noobs - 8 - VaultThis challenge basically teaches how nothing is really private on the blockchain and all data can be seen by everyone. The word private or internal should not be used to store "private" things like passwords. Objective: Unlock the vault to pass the ...DiscussEthernaut - Walkthrough for Noobs 2Articles1Week
HarborforHarborharbor.hashnode.net·Mar 8, 2023Pointers for incorporating Smart Contract’s safety elements: Best PracticesAfter internalizing the smart contract security mentality and becoming familiar with the EVM’s quirks, it’s time to think about some security patterns unique to the Solidity programming language. This summary will center on safe programming practices...DiscussSmart Contracts
Opeyemi AdewoleforBlockchain & Chilldliteofficial.hashnode.net·Feb 8, 20234 tools to 3x your productivity in Remix as a solidity developerIntroduction Every solidity developer used remix in writing smart contract code. Some developers still do. One of the reasons developers use remix is the interface it provides for interacting with deployed smart contracts. It takes a while and a good...Discuss·2 likes·129 readsSolidity
Glory Praise EmmanuelforGlory Praise's Blogglorypraise.hashnode.net·Jan 14, 2023Vulnerability #2 - Reentrancy in SolidityReentrancy is a form of vulnerability that can happen in Solidity contracts when an external contract has the ability to call the main smart contract function repeatedly in order to drain its funds before the original call has ended. A reentrancy att...Discuss·10 likes·57 readsSmart Contract Security & Audit SeriesSolidity
Valentine Chukwuonyeforchinedu.hashnode.net·Jan 14, 2023Hacking Solidity: Re-Entrancy Attack!Re-entrancy attack is one of the oldest and most destructive attacks discovered in solidity smart contracts. Hopefully, you've heard of the 'DAO Hack'. This hack has a huge role to play in the popularity of 'Re-entrancy Attacks'. Over 3.6 million ETH...DiscussSolidity