
Reentrancy Attacks in Solidity Smart Contracts
It's been several years since hackers stole a lot of money from the DAO in 2016 by using a trick called a reentrancy attack. This kind of attack can still happen today and cause serious financial problems. Luckily, there are ways to stop these attacks and keep your project safe.How does it work?A reentrancy attack on a smart contract happens when one contract gives control to another contract. Then, the second contract can call the first contract again before the first call is finished. ...
Integer Overflows and Underflows
Integer overflow and underflow are common issues in programming, including Solidity. Arithmetic operations can result in these issues when the result exceeds the representable range of numbers. This often leads to unpredictable contract behavior and poses potential security risks.IN DETAILSThe Ethereum Virtual Machine (EVM) imposes size limitations on integer data types. Each type has a fixed range of values. For instance, a variable of type uint8 can only hold integer values from 0 to 255, i...
Smart Contracts Security Audits Infrastructure vulnerability analysis

Reentrancy Attacks in Solidity Smart Contracts
It's been several years since hackers stole a lot of money from the DAO in 2016 by using a trick called a reentrancy attack. This kind of attack can still happen today and cause serious financial problems. Luckily, there are ways to stop these attacks and keep your project safe.How does it work?A reentrancy attack on a smart contract happens when one contract gives control to another contract. Then, the second contract can call the first contract again before the first call is finished. ...
Integer Overflows and Underflows
Integer overflow and underflow are common issues in programming, including Solidity. Arithmetic operations can result in these issues when the result exceeds the representable range of numbers. This often leads to unpredictable contract behavior and poses potential security risks.IN DETAILSThe Ethereum Virtual Machine (EVM) imposes size limitations on integer data types. Each type has a fixed range of values. For instance, a variable of type uint8 can only hold integer values from 0 to 255, i...
Smart Contracts Security Audits Infrastructure vulnerability analysis

Subscribe to Oxorio

Subscribe to Oxorio
Share Dialog
Share Dialog
<100 subscribers
<100 subscribers


Blockchain Audits & Penetration Testing | @oxorio_security
Blockchain Audits & Penetration Testing | @oxorio_security
No activity yet