Daily Security


Гео и язык канала: не указан, не указан
Категория: не указана


My attempts to gain practical and theoretical knoweldge by reading and doing sc audits

Связанные каналы  |  Похожие каналы

Гео и язык канала
не указан, не указан
Категория
не указана
Статистика
Фильтр публикаций


Репост из: Anon
Folks. Would be grateful for any donations❤️

BUSD BEP20
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516

USDT BEP20
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516

USDC ERC20
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516

USDT ERC20
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516

Matic
0x06009Fd4D3a8a8D00b4b402EE133369651eDf516

USDT TRC20
TPyHztRbhq4SgRogmHHhUeAJpYjfrpmvab


How to reset the nonce of Deployer?








Audit checklists for CDP( Collaterized Debt Positions)

Give it a star🙏

https://github.com/Decurity/audit-checklists/blob/master/cdp.md




Репост из: Securlydev
If you see a Solidity method that has an argument of type array, always check for 3 things:

1. What if the array length is 0?
2. What if there are duplicated elements in the array?
3. What if there are zero value elements in the array?
@EthSecurity1




Репост из: Securlydev
Web3 Dev
1)How do you construct a lending protocol that supports arbitrary collateral, has no oracles, and has no expirations?

Read the whitepaper to find out:
paradigm.xyz/2023/05/blend

2) Web3education.dev brought by patrick collins

@EthSecurity1




















Репост из: Securlydev
🔴Many security vulnerabilities come from faulty assumptions

Identifying the assumptions made by the devs and evaluating if they are correct can uncover big discrepancies between what the code does vs what it is intended to do

Here are examples of common faulty assumptions: 📔

1. Initialization functions will only be called ONCE and/or can be called only by the contract deployer

2. Only admins can call certain functions(access control issues)

3. Functions will always be called in a certain order as expected by the system

Ex. what if there's a function that closes a position but expects that you opened one in the 1st place?

A function that checks if your payment is on time but expects you got a loan before that?

4. Parameters can only have non-zero values or values within a certain threshold

addresses will never be zero-valued
sender will always be different from the receiver
an element of a struct array will always exist so the values won't be the default ones

5. Certain addresses or data values can never be attacker-controlled

6. Function calls will always be successful and so checking for return values is not required
These are just a few examples of common assumptions that don't always hold true
Always try to identify what assumptions are made when writing the code and compare that to how the system could actually behave
@EthSecurity1

Показано 20 последних публикаций.

539

подписчиков
Статистика канала