From fe7d558b85f09db80f6e1c0632adb2d5803c29fe Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?BT3GL=20/ba=C9=AAt=C9=A1=C9=9D=C9=AB/?= <1130416+bt3gl@users.noreply.github.com> Date: Tue, 12 Apr 2022 02:16:28 +0400 Subject: [PATCH] Update README.md --- Smart-Contract-Security/README.md | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/Smart-Contract-Security/README.md b/Smart-Contract-Security/README.md index d826e62..8ec78d1 100644 --- a/Smart-Contract-Security/README.md +++ b/Smart-Contract-Security/README.md @@ -17,3 +17,19 @@ balances[msg.sender] -= amount; * Invocation of local functions via `this`: never use `this` to call functions in the same contract, it only consumes more gas than normal call. * Transferring Ether in a for/while/do-while loop should be avoid due to the block gas limit. * ERC20 `decimals` should have `uint8` as return type. + +
+ +--- + +
+ + + +### References + +* [Uniswap Oracle Attack Simulator by Euler](https://blog.euler.finance/uniswap-oracle-attack-simulator-42d18adf65af) + * "Given current concentrated liquidity profile of the ABC/WETH pool, what would it cost the attacker to move a N-minute TWAP of the ABC price to x?" +* [Hacking the Blockchain by Immunifi](https://medium.com/immunefi/hacking-the-blockchain-an-ultimate-guide-4f34b33c6e8b) +* [Thinking About Smart Contract Security by Vitalik](https://blog.ethereum.org/2016/06/19/thinking-smart-contract-security/) +* [Spoof tokens on Ethereum](https://medium.com/etherscan-blog/spoof-tokens-on-ethereum-c2ad882d9cf6)