Solidity Crash Course

Introduction In this first article in the series, we’ll start with the basics of what Solidity is, what smart contracts are, how they work, how they are implemented, and then dig right into some cool Solidity examples and details. Of course, the first question poses itself: what is Solidity? As you could have imagined, Solidity … Read more

Polygon for Developers – A Simple Guide with Video

What are Polygon and MATIC all about and why is another blockchain needed? You will find answers to these questions in this article. The article starts with problems plaguing Ethereum, workable solutions to the problem, and then dives into more details of the Polygon network, its history, tokenomics, and an overview of the Polygon SDK. … Read more

Smart Contract Replay Attack in Solidity

This is part 8 and a continuation of the Smart Contract Security Series. Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack This post provides insights into the replay attack in blockchains. As per the wiki, a replay attack is a valid data … Read more

Top 9 Crypto Jobs for Coders in 2023

Blockchains penetrate into every single field in computer science. Fields such as borrowing, lending, web3, crypto gaming, NFTs, DAOs, trading — to mention just a few — experience a rapid growth in recent years. Both developers and users flock to decentralized, open, permissionless protocols: Blockchains. The exploding interest in Blockchain development brings opportunity to coders … Read more

Smart Contract Randomness or ReplicatedLogic Attack

This is part 7 and a continuation of the Smart Contract Security Series. Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack In this tutorial, the randomness attack or also called replicated logic attack is analyzed. The problem in Solidity contracts is finding … Read more

Top 11 DeFi Articles to Get Started in Crypto

DeFi (or “decentralized finance”) is a term used to refer to financial services transacted on public blockchains. DeFi is permissionless and open to all. Transactions are routed through a decentralized network or blockchain. DeFi applications provide many of the same services provided by traditional banks such as lending, borrowing, trading, to mention just a few. … Read more

DelegateCall or Storage Collision Attack on Smart Contracts

The post is part 6 and continues our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack The DelegateCall attack or storage collision is expounded in this post. Before you can grasp this exploit, you must first understand how … Read more

Ethereum Smart Contract Fuzz-Testing with Echidna

What is Fuzzing?                 Fuzz testing (or fuzzing) is an automated software testing method with the goal to find vulnerabilities, security issues, and defects of the application. The idea is to inject invalid, malformed, or unexpected inputs into the application using a fuzzing tool and observing how the system reacts to those inputs (e.g., exceptions, leakage … Read more

Denial of Service (DoS) Attack on Smart Contracts

This post is part 5 of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack The post discusses the Denial of Service or alias the DoS attack. The Denial of Service (hence referred to as DoS) restricts legitimate … Read more