Ethereum Smart Contract Fuzz-Testing with Echidna

What is Fuzzing?                 Fuzz testing (or fuzzing) is an automated software testing method with the goal to find vulnerabilities, security issues, and defects of the application. The idea is to inject invalid, malformed, or unexpected inputs into the application using a fuzzing tool and observing how the system reacts to those inputs (e.g., exceptions, leakage … Read more

15 Highly Profitable Freelancing Niches Developers Miss Out On [Video Collection]

In this guide, I’ve compiled the top 7 freelancing niches I found highly profitable based on my experience working as a business owner and freelancer myself, hiring hundreds of freelance developers for my company, and teaching thousands of freelancing students through our books and courses. Each niche is presented with a video where I show … Read more

Denial of Service (DoS) Attack on Smart Contracts

This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack The post discusses the Denial of Service or alias the DoS attack. The Denial of Service (hence referred to as DoS) restricts legitimate users from using the smart contracts permanently or … Read more

tx.origin Phishing Attack — Smart Contract Security Series [Part 4]

This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack In this post, we discuss phishing attacks due to tx.origin. In the regular phishing of a website, phishing begins with a phony email or another kind of communication intended to entice … Read more

Reentrancy Attack – Hacking Smart Contract Security Series [Part 3]

You can check out the code for this article on our GitHub. Preamble This post is in continuation of our Smart Contract Security Series. This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack The post discusses the next attack called … Read more

Top 10 Solidity Tutorials

If you are considering investing time in learning about blockchain, it can seem a weighty undertaking.  There are a multitude of blockchain variants such as Bitcoin, Ethereum, Litecoin, and Dogecoin, and the terminology can be just as confusing.  Four general types of blockchain networks are in use today: public, private, consortium, and permissioned.  Each has … Read more

Private Variable Exploit – Hacking Smart Contract Security Series [Part 2]

Introduction This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack In this part 2 of the series, we’ll examine how to exploit the “private” vulnerability in Solidity. As the name suggests, private means not accessible to anyone outside. Can we … Read more

Ownership Exploit – Smart Contract Security Series Part 1

In the smart contract security series, we will see multiple vulnerabilities, attacks, and exploitations in the smart contracts, along with the prevention measures. This post is part of our Smart Contract Security Series: Ownership Exploit Private Variable Exploit Reentrancy Attack tx.origin Phishing Attack Denial of Service Attack Unlike mobile and web development, in which software … Read more

Creating an NFT Marketplace with Solidity and JavaScript

This tutorial shows you how to implement your own prototype of an NFT marketplace with Solidity and JavaScript. You can check out the code on our GitHub: GitHub: https://github.com/finxter/NFTMarketplace For additional help, you can find a full course with explainer videos on the Finxter Computer Science Academy: Video Course: Creating an NFT Marketplace with Solidity … Read more

How to Deploy a Smart Contract to Polygon in Brownie

This article will look at deploying a smart contract to Polygon using Brownie.  What is Polygon? Polygon is “a protocol and a framework for building and connecting Ethereum-compatible blockchain networks” (https://polygon.technology/). It started as Matic Network in 2017 to solve Ethereum’s scalability and user experience issues by using an ​off/side chain scaling solution. In 2021, … Read more