#soliditysecurity search results

Static analysis tools for solidity smart contracts 👉Slither 👉Aderyn #SmartContracts #Solidity #SoliditySecurity

yash_ether's tweet image. Static analysis tools for solidity smart contracts

👉Slither
👉Aderyn

#SmartContracts #Solidity #SoliditySecurity

Solidity Tip: Using SafeMath library for arithmetic operations #SafeMath #SoliditySecurity #SmartContractTips

zero2hero_uk's tweet image. Solidity Tip: Using SafeMath library for arithmetic operations
 #SafeMath #SoliditySecurity #SmartContractTips

Bugs don’t always live in complex code - they hide in forgotten edge cases. In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing. ➡️youtube.com/watch?v=NOWtig… #SoliditySecurity #Web3Audit

payatulabs's tweet image. Bugs don’t always live in complex code - they hide in forgotten edge cases.

In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing.

➡️youtube.com/watch?v=NOWtig…

#SoliditySecurity #Web3Audit

Enhancing #SoliditySecurity 🛡️: Check out this simple example demonstrating input validation in a Solidity smart contract. Learn how to prevent vulnerabilities and ensure safer #SmartContracts. #BlockchainDev #CryptoCoding 💻🔒

anointingmlabs's tweet image. Enhancing #SoliditySecurity 🛡️: Check out this simple example demonstrating input validation in a Solidity smart contract. Learn how to prevent vulnerabilities and ensure safer #SmartContracts. #BlockchainDev #CryptoCoding 💻🔒

Starting 2024 with solid security goals, though I might have overdone it on the candy! 🍬💻 Balancing code solidity and sweet indulgence for a robust and delightful year ahead! 🔐✨ #SoliditySecurity #CodingBalance

DomoHacks's tweet image. Starting 2024 with solid security goals, though I might have overdone it on the candy! 🍬💻 Balancing code solidity and sweet indulgence for a robust and delightful year ahead! 🔐✨ #SoliditySecurity #CodingBalance

🚫 Red Flag: For a token contract with "mint() access only to the owner" Be careful. That’s how rugs happen. #DYOR #SoliditySecurity


Why it’s dangerous - If the receiver is a contract, it can re enter and drain funds before balance updates. - Fix: Use `transfer()` (gas-limited) or add a reentrancy guard. 💡 Lesson: Assume every external call is hostile. #soliditysecurity #Web3


🚨 As a #SoliditySecurity researcher, every bug I find isn’t just a win — it’s millions of dollars and user trust saved. Blockchain’s future depends on fresh eyes & relentless curiosity. Security is tough, frustrating, but incredibly rewarding.


🎉 Let's fortify our smart contracts and make the blockchain a safer place! Together, we can be Solidity Security Superstars! 🌟🔒 #SoliditySecurity #BlockchainRevolution 🚀💪


Reentrancy isn't just about call.value(). It's about external calls before state changes. Even ERC-20 transfers can be weaponized. 💣 Don’t just copy paste @OpenZeppelin, understand it. #Ethereum #SoliditySecurity


Blockchain is all about trust—but trust needs to be earned! Always audit your smart contracts before going live. Better safe than sorry. #SoliditySecurity #CryptoBestPractices


3. Invariant Checks = Always True Logic Use invariant functions to assert conditions that must always hold. Example: Token balances should never go negative. 🛡️ Helps validate contract logic over many state changes. #SoliditySecurity #Foundry


8/10 🚨 Watch out for integer overflow/underflow issues in older versions of Solidity. Always upgrade to Solidity 0.8+ for automatic overflow checks. #SoliditySecurity


2/10 🚧 Be cautious when using selfdestruct(). It removes the contract from the blockchain, which can be dangerous if not handled with proper permissions. #SoliditySecurity


9/10 ⚖️ Always check for failures in external calls (e.g., calls to other contracts). Use the require() or assert() statement to ensure your contract behaves as expected. #SoliditySecurity


5/ Bonus: Security Tips ✅ Restrict who can update data ✅ Add a cooldown or timestamp check ✅ Log all updates for traceability This is basic, but good enough to start with. #SoliditySecurity #learningWeb3withMyke


🧠 The hardest bug in Web3 isn't reentrancy or overflow. It's assuming your code will only ever be called the way you intended. DeFi is adversarial. If you leave a door unlocked, someone will test the hinges. #SoliditySecurity #Web3Dev


🧵 Safety Tip: Most exploits in upgradable contracts come from: — Unprotected admin functions — Misaligned storage slots — Poor upgrade tests — Sudden governance pushes Fix these first. #SoliditySecurity #BlockchainDev


3. Invariant Checks = Always True Logic Use invariant functions to assert conditions that must always hold. Example: Token balances should never go negative. 🛡️ Helps validate contract logic over many state changes. #SoliditySecurity #Foundry


Bugs don’t always live in complex code - they hide in forgotten edge cases. In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing. ➡️youtube.com/watch?v=NOWtig… #SoliditySecurity #Web3Audit

payatulabs's tweet image. Bugs don’t always live in complex code - they hide in forgotten edge cases.

In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing.

➡️youtube.com/watch?v=NOWtig…

#SoliditySecurity #Web3Audit

🧠 The hardest bug in Web3 isn't reentrancy or overflow. It's assuming your code will only ever be called the way you intended. DeFi is adversarial. If you leave a door unlocked, someone will test the hinges. #SoliditySecurity #Web3Dev


Reentrancy isn't just about call.value(). It's about external calls before state changes. Even ERC-20 transfers can be weaponized. 💣 Don’t just copy paste @OpenZeppelin, understand it. #Ethereum #SoliditySecurity


Why it’s dangerous - If the receiver is a contract, it can re enter and drain funds before balance updates. - Fix: Use `transfer()` (gas-limited) or add a reentrancy guard. 💡 Lesson: Assume every external call is hostile. #soliditysecurity #Web3


🚫 Red Flag: For a token contract with "mint() access only to the owner" Be careful. That’s how rugs happen. #DYOR #SoliditySecurity


5/ Bonus: Security Tips ✅ Restrict who can update data ✅ Add a cooldown or timestamp check ✅ Log all updates for traceability This is basic, but good enough to start with. #SoliditySecurity #learningWeb3withMyke


🧵 Safety Tip: Most exploits in upgradable contracts come from: — Unprotected admin functions — Misaligned storage slots — Poor upgrade tests — Sudden governance pushes Fix these first. #SoliditySecurity #BlockchainDev


Reentrancy isn’t just about ETH. It’s about calling back anything at the wrong time. #Reentrancy #SoliditySecurity #SmartContracts #Web3Tips


Contributing to these projects allows you to learn from experienced developers and improve the security of the wider ecosystem. #OpenSource #SoliditySecurity


5/ Security Insight: At first, I mistakenly allowed anyone to withdraw the contract’s ETH (🙆‍♂️😬). But I fixed it with an onlyOwner check 😌✅️🔒 Lesson: NEVER leave withdrawal functions public. #SoliditySecurity #SmartContractAudit


Access control flaws are the silent killers in smart contracts. Always check for restrictions, such as onlyOwner and other access control mechanisms. #SoliditySecurity #BlockchainAudit #web3security #solidity


🚨 As a #SoliditySecurity researcher, every bug I find isn’t just a win — it’s millions of dollars and user trust saved. Blockchain’s future depends on fresh eyes & relentless curiosity. Security is tough, frustrating, but incredibly rewarding.


📌 Always initialize state variables in Solidity ! Uninitialized variables can lead to unexpected behavior and vulnerabilities. Stay safe ! 🔥 #SoliditySecurity #SmartContracts


Bugs don’t always live in complex code - they hide in forgotten edge cases. In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing. ➡️youtube.com/watch?v=NOWtig… #SoliditySecurity #Web3Audit

payatulabs's tweet image. Bugs don’t always live in complex code - they hide in forgotten edge cases.

In this video, we found a high-severity bug hiding in a simple transfer() logic using nothing but bookmarks, test coverage, and fuzzing.

➡️youtube.com/watch?v=NOWtig…

#SoliditySecurity #Web3Audit

Static analysis tools for solidity smart contracts 👉Slither 👉Aderyn #SmartContracts #Solidity #SoliditySecurity

yash_ether's tweet image. Static analysis tools for solidity smart contracts

👉Slither
👉Aderyn

#SmartContracts #Solidity #SoliditySecurity

Solidity Tip: Using SafeMath library for arithmetic operations #SafeMath #SoliditySecurity #SmartContractTips

zero2hero_uk's tweet image. Solidity Tip: Using SafeMath library for arithmetic operations
 #SafeMath #SoliditySecurity #SmartContractTips

Enhancing #SoliditySecurity 🛡️: Check out this simple example demonstrating input validation in a Solidity smart contract. Learn how to prevent vulnerabilities and ensure safer #SmartContracts. #BlockchainDev #CryptoCoding 💻🔒

anointingmlabs's tweet image. Enhancing #SoliditySecurity 🛡️: Check out this simple example demonstrating input validation in a Solidity smart contract. Learn how to prevent vulnerabilities and ensure safer #SmartContracts. #BlockchainDev #CryptoCoding 💻🔒

Starting 2024 with solid security goals, though I might have overdone it on the candy! 🍬💻 Balancing code solidity and sweet indulgence for a robust and delightful year ahead! 🔐✨ #SoliditySecurity #CodingBalance

DomoHacks's tweet image. Starting 2024 with solid security goals, though I might have overdone it on the candy! 🍬💻 Balancing code solidity and sweet indulgence for a robust and delightful year ahead! 🔐✨ #SoliditySecurity #CodingBalance

Loading...

Something went wrong.


Something went wrong.


United States Trends