Category: Security

Invariant Testing in Foundry
Invariant Testing in Foundry Introduction In this article, we will discuss invariants and how to perform an invariant test on solidity smart contracts using foundry test suites. Invariant testing is…

Hacking Underconstrained Circom Circuits With Fake Proofs
Hacking Underconstrained Circom Circuits With Fake Proofs The <– operator in Circom can be dangerous because it assigns values to signals but does not constrain them. But how do you…

Flash Loans and how to hack them: a walk through of ERC 3156
Flash Loans and how to hack them: a walk through of ERC 3156Flash loans are loans between smart contracts that must be repaid in the same transaction. This article describes…

Getting a smart contract audit: what you need to know
Getting a smart contract audit: what you need to know A smart contract audit is a review by blockchain security experts to ensure that users will not lose funds due…

Smart Contract Security
Smart Contract Security This article serves as a mini course on smart contract security and provides an extensive list of the issues and vulnerabilities that tend to recur in Solidity…

Solidity Mutation Testing
Solidity Mutation Testing Mutation testing is a method to check the quality of the test suite by intentionally introducing bugs into the code and ensuring the tests catch the bug.…

Where to find solidity reentrancy attacks
Where to find solidity reentrancy attacks Reentrancy can only happen when your smart contract calls another smart contract via function call or sending ether. If you do not call another…