EthSecurity
5.22K subscribers
112 photos
20 files
758 links
Download Telegram
Protecting smart contracts against reverse engineering - Good Read! πŸ‘€

https://t.co/yRdikSZ91D

In this paper, Authors propose an automated #security enhancement tool for protecting smart contracts against reverse engineering πŸ™Œ
Introducing ZDK: Zora Development Kit

Zora has the most fully featured and complete toolset:
↳ Hooks
↳ API
↳ ZDK
↳ Protocol

ZDK is a powerful dev tool for builders to easily create their own NFT platform, app and artworks.

https://t.co/HsJsZkgaGH https://t.co/EbunOQNVQF
A journey into #Ethereum 2.0 #Blockchain #Fuzzing and vulnerability discovery - Good Read! πŸ™Œ

- https://t.co/UE8kT4OARc https://t.co/zQ3ThmCfvV
Why and how zk-SNARK works - Good Read! 🧐

https://t.co/8Kyh1kmnNb

The primary goal of this study is not only to explain how it works but why it works and how it came to be this way 😎
Detecting nondeterministic payment bugs in #Ethereum smart contracts - Good Read! 🧐

https://t.co/D2Kf7L62cz https://t.co/kdd3YzfqpZ
πŸ‘2
EthSecurity pinned Deleted message
A low-latency commit-and-reveal architecture to mitigate #Blockchain front-running - Good Read! πŸ‘€

PDF: https://t.co/n523G63SQj

https://t.co/Dxe1l0OF2D https://t.co/TljXUAFVaL
Just spotted an awesome project for which Authors put together all known MITM (Man-In-The-Middle) attacks and methods of protection against these attacks πŸ‘€

https://t.co/yq2DMpJPDt
Cz:
Our threat intel detected a potential exploit on Uniswap V3 on the ETH blockchain. The hacker has stolen 4295 ETH so far, and they are being laundered through Tornado Cash. Can someone notify @Uniswap? We can help. Thanks

https://t.co/OV3g7ayf77

That was phishing 😫
Denial-of-Service vulnerability of hash-based transaction sharding - Good Read! 🧐

PDF: https://t.co/pbf3KziZyW

https://t.co/CRpzEidYTf
The Interest Protocol token sale contract has a bug that allows admins to take all IPT tokens before purchasers can claim them.

The admin withdraw() method does not check if it has already been called - withdraw() can be called repeatedly to drain the entire contract of IPT.
πŸ‘1