Solidity Crash Course

Introduction In this first article in the series, we’ll start with the basics of what Solidity is, what smart contracts are, how they work, how they are implemented, and then dig right into some cool Solidity examples and details. Of course, the first question poses itself: what is Solidity? As you could have imagined, Solidity … Read more

Polygon for Developers – A Simple Guide with Video

What are Polygon and MATIC all about and why is another blockchain needed? You will find answers to these questions in this article. The article starts with problems plaguing Ethereum, workable solutions to the problem, and then dives into more details of the Polygon network, its history, tokenomics, and an overview of the Polygon SDK. … Read more

Smart Contract Replay Attack in Solidity

This is part 8 and a continuation of the Smart Contract Security Series. Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack This post provides insights into the replay attack in blockchains. As per the wiki, a replay attack is a valid data … Read more

Top 11 DeFi Articles to Get Started in Crypto

DeFi (or “decentralized finance”) is a term used to refer to financial services transacted on public blockchains. DeFi is permissionless and open to all. Transactions are routed through a decentralized network or blockchain. DeFi applications provide many of the same services provided by traditional banks such as lending, borrowing, trading, to mention just a few. … Read more

DelegateCall or Storage Collision Attack on Smart Contracts

The post is part 6 and continues our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack The DelegateCall attack or storage collision is expounded in this post. Before you can grasp this exploit, you must first understand how … Read more

Denial of Service (DoS) Attack on Smart Contracts

This post is part 5 of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack The post discusses the Denial of Service or alias the DoS attack. The Denial of Service (hence referred to as DoS) restricts legitimate … Read more

tx.origin Phishing Attack — Smart Contract Security

This post is part 4 of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack In this post, we discuss phishing attacks due to tx.origin. In the regular phishing of a website, phishing begins with a phony email … Read more

Reentrancy Attack – Hacking Smart Contracts [Solidity]

You can check out the code for this article on our GitHub. Preamble This post is part 3 in continuation of our Smart Contract Security Series. This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack … Read more

Top 10 Solidity Tutorials

If you are considering investing time in learning about blockchain, it can seem a weighty undertaking.  There are a multitude of blockchain variants such as Bitcoin, Ethereum, Litecoin, and Dogecoin, and the terminology can be just as confusing.  Four general types of blockchain networks are in use today: public, private, consortium, and permissioned.  Each has … Read more

Private Variable Exploit – Hacking Smart Contracts in Solidity

Introduction This post is part 2 of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Storage Collision Attack Randomness Attack Replay Attack In this part 2 of the series, we’ll examine how to exploit the “private” vulnerability in Solidity. As the name suggests, private … Read more