Yuvraj Singhtechwithyuvi.hashnode.dev·5 hours agoSwitching from Remix to Local Setup for Blockchain Development (Using foundry)After working with Remix, the next question that anyone with prior development experience would ask is - “A web based IDE? That doesn’t sound very convenient…” And honestly, I get you! And that is why we have a Solidity based framework called FOUNDRY...Web3
Daciandacian.me·Jan 23, 2025DeFi Liquidation VulnerabilitiesPrompt and efficient liquidation is crucial to maintaining solvency in DeFi protocols, yet it is among the hardest and most complex code to implement in a safe and especially trustless manner. There are many potential vulnerabilities and bugs which c...10 likes·434 readsDeep DivesSmart Contracts
Muhammad Ihsanemhaihsan.hashnode.dev·Jan 23, 2025Mengenal Tipe Data Dasar dalam SolidityTeknologi blockchain sudah mengubah paradigma cara berfikir generasi saat ini terkait dengan sistem yang terdesentralisasi, transparan dan dapat dipercaya. Di antara bagian penting meningkatnya adaptasi teknologi ini setelah fenomena kemunculan bitco...Solidity
Mahesh Vashisthmaheshvashisth.hashnode.dev·Jan 22, 2025Blockchain Bridges: Connecting the World of Decentralized NetworksIntroduction In this blog, we’ll dive into blockchain bridges, an essential technology that facilitates the transfer of assets like USDT between different blockchains, such as Solana and Ethereum. We’ll explore how tokens are securely locked on one b...Blockchain
aniebietaniebiet.hashnode.dev·Jan 20, 2025Simple Explanation of Unsafe Casting Vulnerability in Smart ContractsAn unsafe casting vulnerability occurs when a smart contract incorrectly converts one data type to another, leading to unexpected behavior or security risks. What is Casting? Casting is when you convert a value of one data type into another. For exam...Web3
aniebietaniebiet.hashnode.dev·Jan 20, 2025Simple Explanation of Integer Overflow in Smart ContractsAn integer overflow vulnerability happens when a number variable in Solidity exceeds its maximum value or goes below its minimum value, causing it to "wrap around" and behave unexpectedly. How It Works: In Solidity, integers have a fixed size (e.g.,...Solidity
Newton Kolapoknewton.hashnode.dev·Jan 20, 2025Web3 and the Future of the InternetWeb3, often called the next evolution of the internet, represents a shift from centralized platforms to decentralized systems. Powered by blockchain technology, Web3 aims to empower individuals by returning control of data, privacy, and digital asset...Web3
aniebietaniebiet.hashnode.dev·Jan 18, 2025Denial of Service (DoS) Vulnerability is Smart Contracts Explained SimplyDenial of Service (DoS) vulnerability in smart contracts happens when an attacker prevents the contract from functioning as intended, stopping others from using it. This can lead to disruptions, financial losses, or locking up funds. How DoS Can Happ...dos attack
aniebietaniebiet.hashnode.dev·Jan 17, 2025Self Destruct Vulnerability in Smart ContractsA selfdestruct vulnerability happens when a smart contract allows unauthorized users to call its selfdestruct function, which can lead to serious consequences: How It Becomes a Vulnerability Unrestricted Access: If the selfdestruct function is not p...Smart Contracts
Samarth Saxenaawesamarth.hashnode.dev·Jan 16, 2025BONUS: Cheatcodes in FoundryIntroduction For testing complex smart contracts, simply examining their outputs may not be enough. To manipulate the state of the blockchain, as well as test for specific reverts and events, Foundry is shipped with a set of cheatcodes. In this guide...Foundry Modecheatcodes in foundry