#solidity
Read more stories on Hashnode
Articles with this tag
On-chain DAO Governance protocols create a large attack surface for creative exploitation.. · Decentralized Autonomous Organizations (DAO) facilitate a...
Integrating with Chainlink involves unique security considerations that can result in exploitable vulnerabilities.. · Chainlink allows smart contract...
Fuzz testing is an invaluable tool for finding & maximizing precision loss vulnerabilities.. · Solidity uses fixed-point arithmetic so Division Before...
Implementing slippage protection in DeFi trading systems can lead to subtle vulnerabilities.. · Slippage refers to the price difference between when a...
Solidity computations can lead to some devious loss of precision errors · Numerical operations in solidity can result in precision loss, where the amount...
Common vulnerabilities leading to signature replay attacks · Signatures can be used in Ethereum transactions to validate computation performed off-chain,...