•NFTPD•
@ProjectNFTPD
Some platypuses that think web3 needs a little more safety. An Endeavor of @The_Utility_Co
คุณอาจชื่นชอบ
WE ARE LIVE!!!💯🚀 REMEMBER TO ONLY USE THESE OFFICIAL LINKS!!! projectnftpd.com/mint/
Fake Collab Invites “You’ve been selected for a collab.” “Let’s build together.” They’re not building. They’re baiting. Always verify partnerships from official channels. #Web3Security
Malicious Browser Pop-ups A random pop-up says: “Your wallet is disconnected — reconnect now.” You click. You’re compromised. Never connect through pop-ups. Always open your wallet manually. #Web3Security
Phishing PDFs Email arrives. “Claim NFT drop — details inside.” The PDF looks normal. The link inside? Malicious. Never trust links hidden in files. #Web3Security
Malicious Wi-Fi Free airport Wi-Fi. Café hotspot. NFT conference Wi-Fi. Scammers run fake networks. You connect. They snoop. Avoid public Wi-Fi for wallets. #Web3Security
[Detective Log] Case: Unchecked Call Value Discovered: The Trojan Airdrop Code Evidence: `function airdropTokens(address[] memory recipients, uint256 amount) public payable { for (uint i = 0; i < recipients.length; i++) { (bool sent, ) = recipients[i].call{value: am
[Detective Log] Case: Reentrancy Attack Discovered: An insidious reentrancy flaw in a DeFi protocol allowed a rogue to drain half a million in a single night. Code Evidence: `function withdraw(uint _amount) public { require(balance[msg.sender] >= _amount); (bool success,) = msg
[Detective Log] Case: Unhandled Exception Discovered: A slip in the solidity code, thrown into chaos by an unhandled exception. Code Evidence: `contract ShadyDeal { function executeDeal(address payable recipient, uint amount) public { require(amount > 0, "Amount must
[Detective Log] Case: Reentrancy Discovered: Phantom Withdrawals in the Midnight Club Code Evidence: `contract MidnightClub { mapping(address => uint) public balances; bool locked; function deposit() public payable { balances[msg.sender] += msg.value; }
Our portal gives you an opportunity to talk to Walter and hear what his opinions are on safety and security and how we will better the space, connect your account and chat with him! #Web3Security
[Detective Log] Case: Unchecked Delegation Discovered: When the loyalty of code can be bought for a handful of gas, chaos ensues. Code Evidence: `contract Delegation { address public owner; function Delegation() public { owner = msg.sender; } function forward(address
[Detective Log] Case: Reentrancy Attack Discovered: The Double Dip Debacle Code Evidence: `contract VulnerableBank { mapping(address => uint) public balances; function deposit() public payable { balances[msg.sender] += msg.value; } function withdraw(uint
Compromised QR Codes Posters. Flyers. Conference booths. “Scan to mint.” Looks harmless. One scan = wallet drainer. Never scan random QR codes. #Web3Security
[Detective Log] Case: Reentrancy Attack Discovered: The ole' double-dip blues: a slick reentrancy trick in the PaymentHandler contract lets crafty crooks keep withdrawing funds beyond their balance. Code Evidence: `function withdraw(uint _amount) public { require(balances[msg
[Detective Log] Case: Reentrancy Discovered: Infinite Minting by Design Code Evidence: ` contract InfiniteMinter { mapping(address => uint256) public balances; bool private locked; function mintToken(uint256 _amount) public { require(!locked, "ReentrancyGuard
[Detective Log] Case: Unchecked External Call Discovered: A rogue function opened the backdoor to chaos in a smart contract. Code Evidence: `function externalCall(address _to, uint256 _amount) public { require(_to.call.value(_amount)()); }` Field Note: In a world where shadow
[Detective Log] Case: Integer Overflow Discovered: Overflow Bandit Strikes: Unsuspecting Contract Bleeds Funds Code Evidence: `pragma solidity ^0.8.0; contract OverflowBandit { mapping(address => uint256) public balances; function deposit() public payable { bala
Bookmark Malware Scam sites ask: “Bookmark us for quick access.” Later… that bookmark runs code. Not a shortcut — a trap. Only bookmark legit domains. #Web3Security
[Detective Log] Case: Reentrancy Discovered: A deadly twist of recursive greed within an innocent-looking fallback function. Code Evidence: `contract Vulnerable {\n mapping(address => uint) public balances;\n \n function withdraw(uint _amount) public {\n require(b
[Detective Log] Case: Reentrancy Discovered: Money drains twice as fast when you forget to lock the door. Code Evidence: `contract SimpleBank { mapping(address => uint) private balances; bool private locked; function withdraw(uint _amount) public { require(balances[msg.sende
[Detective Log] Case: Insufficient Access Control Discovered: Private function goes public, trust shattered. Code Evidence: `pragma solidity ^0.8.0; contract TrustFund { address private owner; uint256 private totalFunds; constructor() { owner = msg.sender;
United States เทรนด์
- 1. #SurvivorSeries 53.6K posts
- 2. Vandy 13.5K posts
- 3. Lash Legend 5,569 posts
- 4. Rhea 14.5K posts
- 5. Mateer 7,502 posts
- 6. Tim Banks 2,956 posts
- 7. Oklahoma 29.2K posts
- 8. Heupel 2,744 posts
- 9. Norvell 3,448 posts
- 10. AJ Lee 9,541 posts
- 11. Tennessee 41.1K posts
- 12. Pavia 6,630 posts
- 13. Vanderbilt 9,843 posts
- 14. Michigan 151K posts
- 15. Baugh 4,413 posts
- 16. Nia Jax 2,346 posts
- 17. Ty Simpson N/A
- 18. Iyo Sky 6,454 posts
- 19. Bama 15K posts
- 20. Jay Huff N/A
คุณอาจชื่นชอบ
-
nighguy
@thenighguy -
tj roobs
@tjroobs -
Web3 Poker Club
@Web3PokerClub -
Professor Pepe X 🔮
@ProfessorPepeX -
Bad Ted Yacht Club
@BadTedYC -
SHIBU Society
@ShibuSocietyNFT -
ltb
@ltpandab -
Douggie
@DouggieNft -
Wealth&HealthByRob
@Web3_Rob_ -
iAliens - Aptos NFT
@iAliensNFT -
World Of Tings 🦍
@worldoftings -
•The Graine Ledger
@thegraineledger
Something went wrong.
Something went wrong.