Manojkumarpewbhai.hashnode.dev·Sep 14, 202421 Days of Solidity Smart Contract Security Research: Day - 4We successfully crossed Day 1, Day 2, and Day 3 about Solidity Smart Contract Security Research. Now, we’re on Day 4 to learn about Decentralized Finance and the important terms where smart contracts play a vital role. Decentralized Finance (DeFi) an...DiscussSmart Contracts
Ccinnamonbutter.ioccinnamoncat.hashnode.dev·Aug 15, 2024Smart Contract Development: Step-by-Step TutorialIntroduction Definition of Smart Contracts Smart contracts are digital contracts that operates mainly on blockchain technology and are typically used to automate the execution of an agreement. Importance of Smart Contracts in Modern Technology If you...Discussdecentralization
Siddharth Patelblog.siddharth.network·Aug 14, 2024Challenge 7: Compromised, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: There are mainly 3 smart...DiscussDamn vulnerable defi V4 solutionsdefi
Siddharth Patelblog.siddharth.network·Aug 14, 2024Challenge 6: Selfie, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: Save the world, you're ba...DiscussDamn vulnerable defi V4 solutionsdefi
Siddharth Patelblog.siddharth.network·Aug 14, 2024Challenge 5: The Rewarder, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: Distributor is distributi...DiscussDamn vulnerable defi V4 solutionsdefi
Siddharth Patelblog.siddharth.network·Aug 13, 2024Challenge 3: Truster, Damn vulnerable defi V4 lazy solutions seriesWhy Lazy? I’ll strongly assume that you’ve gone through challenge once or more time and you’ve some understandings of the challenge contracts flows. So, I’ll potentially will go towards solution directly. Problem statement: We are given 0 funds, and...DiscussDamn vulnerable defi V4 solutionsdefi
Nour Eldennour99.hashnode.dev·Jul 28, 2024SafeMath Library for Inline Assembly/Yul in Solidity Smart ContractsIntroduction After solving the Node Guardians Quest ‘Yul basics’, I've gained insights into writing assembly code for a SafeMath library. Since v0.8.0, Solidity supports overflow and underflow checks for arithmetic operations, but inline assembly doe...Discussinline-assembly
ek javadjavadweb3.hashnode.dev·Jul 10, 2024Smart Contracts: The Backbone of Blockchain TechnologySmart contracts are self-executing contracts with the terms of the agreement directly written into code. These contracts operate on blockchain technology, ensuring that all transactions are traceable, transparent, and irreversible. By eliminating the...DiscussBlockchain
Ashish Kumar Sahoogenashish.hashnode.dev·Jul 5, 2024Guide to Reentrancy Vulnerabilities in Solidity : Attack #02Introduction: A reentrancy attack is a type of vulnerability that can occur in a smart contract, where an attacker exploits the contract by repeatedly calling a function before the initial execution of that function is complete and the state of the c...DiscussSmart Contracts
Ashish Kumar Sahoogenashish.hashnode.dev·Jul 4, 2024Guide to Preventing Access Control Flaws in Solidity: Attack #01Introduction: What the heck is access control??? In software development, access control refers to the practice of granting users or administrators the ability to access certain functions or options and modify certain things based on predefined crite...Discuss·1 likeSolidity