Blockchain Hacking Techniques 2022 Top 10 - Todo
Intro
Attacking an Ethereum L2 with Unbridled Optimism
A vulnerability disclosed in Profanity, an Ethereum vanity address tool
Could Wrapped Tokens Like WETH Be (forced) Insolvent?
How did I Save 70000 ETH and Win 6 Million Bug Bounty
Phantom Functions and the Billion-Dollar No-op
How to Steal $100M from Flawless Smart Contracts
Read-only Reentrancy – a Novel Vulnerability class responsible for 100m+ funds at risk
Avalanche's $350M Risk Report
The "6.2 L2 DAI Allows Stealing" issue from the StarkNet-DAI-Bridge Smart Contracts Code Assessment
Compound-TUSD Integration Issue Retrospective
1. Attacking an Ethereum L2 with Unbridled Optimism
2. A vulnerability disclosed in Profanity, an Ethereum vanity address tool
3. Could Wrapped Tokens Like WETH Be (forced) Insolvent?
4. How did I Save 70000 ETH and Win 6 Million Bug Bounty
5. Phantom Functions and the Billion-Dollar No-op
6. How to Steal $100M from Flawless Smart Contracts
7. Read-only Reentrancy – a Novel Vulnerability class responsible for 100m+ funds at risk
8. Avalanche's $350M Risk Report
9. The "6.2 L2 DAI Allows Stealing" issue from the StarkNet-DAI-Bridge Smart Contracts Code Assessment
10. Compound-TUSD Integration Issue Retrospective
Last updated