Aapsi Khairaaapsi.hashnode.dev·Apr 25, 2024What is Address(0) or Null Address in Solidity?Introduction In the exciting realm of Ethereum and smart contracts, the concept of Address(0) stands as a fascinating enigma, often referred to as the “null address” or “zero address.” But what exactly is Address(0), and why does it hold such a uniqu...DiscussSolidity
Zealynx Securityzealynx.hashnode.dev·Apr 17, 2024Invariant Tests with Echidna for AMM Smart ContractsIn this article, we are going to review Invariant tests for AMM contracts with Echidna, with a short comparison with Foundry invariant testing and a deep dive into property-based invariant tests for an Automated Market Maker smart contract. Introduc...Discuss·10 likes·26 readsSmart Contracts
Zealynx Securityzealynx.hashnode.dev·Apr 17, 2024The Critical Role of Fuzzing in Blockchain SecurityIn this article, we will dive into the fascinating realm of fuzzing. To understand it and before setting up our tests in Foundry we will learn what is the core concept of fuzzing. What is fuzzing? Fuzzing, or fuzz testing, is a technique where invali...Discuss·31 readsSmart Contracts
Bello Roqeeb O.roqbell.hashnode.dev·Jan 25, 2024Elevating Smart Contract Security: A Call to Action! 🛡️🌐 Elevating Smart Contract Security: A Call to Action! 🛡️ It's been a transformative year since I delved into the expansive realm of web3 and blockchain technology. From a curious onlooker to a Solidity smart contract developer, I've evolved into ...DiscussSmart Contracts
RivanorthProblog.rivanorth.com·Jan 4, 2024Hack Explained - Radiant CapitalRadiant Capital, a cross-chain lending protocol, recently experienced a significant security breach. As a platform that aims to unify fragmented liquidity across various lending protocols and chains in the decentralised finance (DeFi) space. Behind t...DiscussNewshack
RivanorthProblog.rivanorth.com·Dec 4, 2023Blockchain Security Roundup: November 2023Another eventful month has unfolded in the world of blockchain security, with this month's highlights featuring a staggering amount of stolen assets! Our Latest Research Secure Proxy Models: Understanding Beacon Proxies The Hacks KyberSwap - $47M - ...DiscussNewsweb3 hacks
RivanorthProblog.rivanorth.com·Oct 31, 2023Unibot Suffers $640k Loss in Router ExploitOn October 31, 2023, Unibot, a trading bot service, faced a severe security breach, resulting in a loss of at least $640k from users who had approved the contract. The exploit targeted the trading bot's newly deployed router contract, stealing funds ...DiscussNewssmart contract audit
darkdepauli7.nftdepauli.hashnode.dev·Oct 24, 2023Demystifying OpcodesHave you ever wondered how the complex world of cryptocurrencies like Ethereum processes commands and operations? Well, it all boils down to something called "opcodes." In simple terms, opcodes are the fundamental instructions that machines or virtua...Discuss·6 likes·38 readsMastering Soliditysolidity opcode
hexbyteblog.hexbyte.in·Oct 17, 2023ERC20 & its quirksThe Ethereum ecosystem has ushered in a new era of decentralized applications, smart contracts, and blockchain-based solutions. With such diversity and decentralization, the need for a standard arises that allows all the current tokens and the ones t...Discuss·1 like·74 readsWeb3
Ashish Meenablockchaindeveloperblog.hashnode.dev·Sep 22, 2023Hacking The Hackers: Hands-On-Examples Of Reentrancy Attack MitigationINTRODUCTION Hello everyone I'm back with a new article. In this article, I am going to explain about most famous and dangerous attack the re-entrancy attack in easy and simple wording. DEFINITION A Re-Entrancy attack is a type of security vulnerabil...DiscussWeMakeDevs