These articles are written by me.
You will find articles about attack vectors, auditing, ctfs and more.
Ensure that your smart contracts are as prepared as possible for the security review. Go into the ultimate guide to efficiently prepare your smart contracts.
I have gathered an explanation for a very popular vulnerability in Solidity, a few high and medium issues that are not a one-time thing but that you will potentially find in other protocols during your next audits.
I am going to help you understand in a simple way what is a reentrancy attack and how you can prevent it. I`ll dive deeper in code examples in order to show where are the vulnerabilities.
Let’s understand what is the role of tx.origin and msg.sender and when it’s recommended to be used.
Let’s learn to hack Solidity together. I will go through how to complete the levels and I will be providing any additional resources to extend the knowledge or to prepare you to complete the challenge by yourself.
Here is my review of the Smart Contract Hacking course after three weeks into it. Was it a good decision to join it?
I gathered some useful information about how to best write your Gas Optimization report on your Auditing contests.
I’d like to share with you how the very first steps look like. Follow this article to get started in your first audit. This will make sure you success from the start.
How do these people find so many issues on the audit contests? Do you know what is it that you are not doing to achieve those results? I`ll tell you what I`ve noticed
The time arrived, I’ve embraced it and I am determined to improve my auditing skills not only by reading reports but by doing shadow audits. I found the right way to do them.