[go: up one dir, main page]

Forem

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Anatomy of a DeFi Hack: Reentrancy Deep Dive

Anatomy of a DeFi Hack: Reentrancy Deep Dive

Comments
2 min read
Reentrancy: From The DAO to Euler Finance

Reentrancy: From The DAO to Euler Finance

Comments
2 min read
Why generating a smart contract is not the hard part anymore

Why generating a smart contract is not the hard part anymore

Comments
4 min read
Building an RSI-Gated DeFi Vault: Stop Deploying Capital Into Downtrends

Building an RSI-Gated DeFi Vault: Stop Deploying Capital Into Downtrends

Comments
7 min read
Finding a Critical Logic Flaw in Legion Protocol’s Epoch Vesting

Finding a Critical Logic Flaw in Legion Protocol’s Epoch Vesting

Comments
2 min read
Investigation of the failing tests with Kode Sherpa

Investigation of the failing tests with Kode Sherpa

1
Comments 2
3 min read
Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Comments
2 min read
RIP-7212: The Precompile That Makes Card Payments On-Chain

RIP-7212: The Precompile That Makes Card Payments On-Chain

Comments
2 min read
On-Chain RSI: How to Read Live Technical Indicators From a Solidity Smart Contract

On-Chain RSI: How to Read Live Technical Indicators From a Solidity Smart Contract

Comments
6 min read
Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Comments
2 min read
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
We turned our AI smart contract generator into an IDE

We turned our AI smart contract generator into an IDE

Comments
1 min read
The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

1
Comments
9 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.