Blockchain Hacking Techniques 2022 Top 10 - Todo

Intro

  1. Attacking an Ethereum L2 with Unbridled Optimism

  2. A vulnerability disclosed in Profanity, an Ethereum vanity address tool

  3. Could Wrapped Tokens Like WETH Be (forced) Insolvent?

  4. How did I Save 70000 ETH and Win 6 Million Bug Bounty

  5. Phantom Functions and the Billion-Dollar No-op

  6. How to Steal $100M from Flawless Smart Contracts

  7. Read-only Reentrancy – a Novel Vulnerability class responsible for 100m+ funds at risk

  8. Avalanche's $350M Risk Report

  9. The "6.2 L2 DAI Allows Stealing" issue from the StarkNet-DAI-Bridge Smart Contracts Code Assessment

  10. Compound-TUSD Integration Issue Retrospective

1. Attacking an Ethereum L2 with Unbridled Optimism

2. A vulnerability disclosed in Profanity, an Ethereum vanity address tool

3. Could Wrapped Tokens Like WETH Be (forced) Insolvent?

4. How did I Save 70000 ETH and Win 6 Million Bug Bounty

5. Phantom Functions and the Billion-Dollar No-op

6. How to Steal $100M from Flawless Smart Contracts

7. Read-only Reentrancy – a Novel Vulnerability class responsible for 100m+ funds at risk

8. Avalanche's $350M Risk Report

9. The "6.2 L2 DAI Allows Stealing" issue from the StarkNet-DAI-Bridge Smart Contracts Code Assessment

10. Compound-TUSD Integration Issue Retrospective

Last updated