mirror of
https://github.com/autistic-symposium/blockchains-security-toolkit.git
synced 2025-11-22 15:41:41 -05:00
| .. | ||
| delegatecall | ||
| nonce | ||
| reentrancy_attacks | ||
| ddos.md | ||
| random_numbers.md | ||
| README.md | ||
smart contract vulnerabilities
tl; dr
tx.originneeds to bere placed bymsg.sender, otherwise any contract you call can act on your behalf.- inline assembly should be used only in rare cases.
- unclear semantics:
nowis alias forblock.timestampnot current time; use of low levelcall,callcode,delegatecallshould be avoided whenever possible; usetransferwhenever failure of ether transfer should rollnack the whole transaction. - beware of caller contracts:
selfdestructcan block calling contracts unexpectedly. - invocation of local functions via
this: never usethisto call functions in the same contract, it only consumes more gas than normal call. - transferring Ether in a for/while/do-while loop should be avoid due to the block gas limit.
- erc20
decimalsshould haveuint8as return type.
in this dir
resources
- secureum-mind-map
- defi hacks & exploits
- ethereum smart contract security best practices
- [biased nonce sense lattice attacks against weak ECDSA](https://www.youtube.com/watch?v=6ssTlSSIJQE_