dappdata_link's profile picture. Securing the Web3 ecosystems. DM for audits

dappdata.link 🇺🇦

@dappdata_link

Securing the Web3 ecosystems. DM for audits

고정된 트윗

Decompiling #EVM #Ethereum or any other contract like @0xPolygon or @BNBCHAIN DApps directly from the browser. A tiny work in progress sample. Follow us for more! 💪

dappdata_link's tweet image. Decompiling #EVM #Ethereum or any other contract like @0xPolygon or @BNBCHAIN DApps directly from the browser. A tiny work in progress sample. Follow us for more! 💪

dappdata.link 🇺🇦 님이 재게시함

What is a sandwich attack in DeFi? Explained with an example✅ Sandwich attack is a Front-Running type of attack and is very common on decentralized exchanges...👇🧵


dappdata.link 🇺🇦 님이 재게시함

Тhis is my favorite resource👌 github.com/SunWeb3Sec/DeF…


dappdata.link 🇺🇦 님이 재게시함

🎉Secureum RACE-18 Results🎉 💨Number of Runners: 215 ⚖️Median Score: 3.3/8 🥇Top Score: 7.3/8 🙏Designer: @Montyly 🤝Top-16 receive free tickets, sponsored by @CertoraInc, to @summit_defi's DeFi Security Summit 2023 in Paris on July 15-16. 🏆Top 32 Leaderboard🏆

TheSecureum's tweet image. 🎉Secureum RACE-18 Results🎉
💨Number of Runners: 215
⚖️Median Score: 3.3/8
🥇Top Score: 7.3/8

🙏Designer: @Montyly

🤝Top-16 receive free tickets, sponsored by @CertoraInc, to @summit_defi's DeFi Security Summit 2023 in Paris on July 15-16.

🏆Top 32 Leaderboard🏆

Secureum RACEs are smart contract security quizzes. Participation is free & requires one-time registering at forms.gle/iL2uQvGZrDq5Uu…. RACE-18 is designed by Secureum mentor @Montyly. Details on Discord.



Look what I've been created! A visual representation of EVM based contracts in Graphview. This is just an empty constructor view 👇

dappdata_link's tweet image. Look what I've been created! A visual representation of EVM based contracts in Graphview. 

This is just an empty constructor view 👇

dappdata.link 🇺🇦 님이 재게시함

Here’s how signature malleability attacks work. Two attacks. If a user signs the same message multiple times, they get a different signature each time. If your code uses a signature as an identifier for blocking actions, users can repeat that action. 1/3

danielvf's tweet image. Here’s how signature malleability attacks work.

Two attacks. 

If a user signs the same message multiple times, they get a different signature each time. If your code uses a signature as an identifier for blocking actions, users can repeat that action. 1/3

Why EVM has so many operations?


Fastest EVM symbolic execution algorithm is almost ready. For example, It's able to resolve proxy contracts in microseconds, generating pseudocode too. 💪


dappdata.link 🇺🇦 님이 재게시함
developer_dao's tweet image.

TLDR: Building a high precision EVM decompiler 💪


dappdata.link 🇺🇦 님이 재게시함

Smart Contract Development and Auditor Roadmap. After youtube.com/watch?v=xv9Omz… by @ProgrammerSmart in step 2, do YT course youtube.com/watch?v=gyMwXu… by @PatrickAlphaC

cryptoThemeX's tweet image. Smart Contract Development and Auditor Roadmap.

After youtube.com/watch?v=xv9Omz… by  @ProgrammerSmart in step 2, 

do YT course youtube.com/watch?v=gyMwXu… by @PatrickAlphaC

Our code block finding algorithm is ready. The best thing, it supports recursive calls out of the box. And can be used with ALL EVM compatible Blockchains. 💪


Reverse engineering a high precision #EVM CFG is kind of a challenge. But it's the first step of a successful decompiler 💪


dappdata.link 🇺🇦 님이 재게시함

Bitcoin is Bitcoin Crypto, web3, NFTs, DAOs, rollups, snarks, airdrops, permissionless finance... ...are Ethereum


United States 트렌드

Loading...

Something went wrong.


Something went wrong.