214 followers
deep diving smart contract security
Fuzz smart contracts using the same code with Echidna, Medusa & Foundry! · Should you use Foundry, Echidna or Medusa fuzzers when writing your smart...
Under-constrained Zero-Knowledge Circuits are ripe for exploitation.. · Zero-Knowledge (ZK) Circuits allow: Provers to make claims without revealing the...
Using assembly to save gas can introduce memory corruption and other subtle vulnerabilities.. · Smart contract developers working on Ethereum mainnet use...
How to get a 42% gas saving when calling keccak256 · Solidity smart contracts often use keccak256 to hash a number of input parameters; the standard way...
Uniswap V3 introduced Concentrated Liquidity allowing Liquidity Providers (LP) to provide liquidity within a custom price range. The major limitations...
On-chain DAO Governance protocols create a large attack surface for creative exploitation.. · Decentralized Autonomous Organizations (DAO) facilitate a...