InCrypto DevOpsbyBruno DelbSolidity smart contract analysis toolsIn this article, I introduce the main tools for security testing of smart contracts written in Solidity :Sep 21, 2022Sep 21, 2022
InCrypto DevOpsbyBruno DelbDASP 10, the top 10 smart contract vulnerabilities in SolidityDASP 10 (Decentralized Application Security Project, https://dasp.co/) is an initiative of NCC Group (https://www.nccgroup.trust/)…Sep 21, 2022Sep 21, 2022
InCrypto DevOpsbyBruno DelbSolidity security: The Reentrancy Guard patternIn this story, I focus on one of the pattern to protect against one of the main attacks: Reentrancy attack.Nov 18, 2022Nov 18, 2022
InCrypto DevOpsbyBruno DelbDYNA hacking, a post-mortem of a Solidity attackOn 22/02/2023, an attack on the Dynamic Finance project on the BSC network, using the $DYNA token, was carried out, which led to the theft…Mar 24, 2023Mar 24, 2023
InCrypto DevOpsbyBruno DelbEFVault hacking, a post-mortem of a Solidity attackIn late February 2023, an attack on Shata Capital’s EFVault project (https://shatacapital.com) was carried out, leading to the theft of…Mar 25, 2023Mar 25, 2023
InCrypto DevOpsbyBruno DelbTaxonomy of vulnerabilities in Solidity smart contractsIn this story, I will share an example of a taxonomy of vulnerability causes. These vulnerabilities are grouped in three categories:Mar 30, 2023Mar 30, 2023
InCrypto DevOpsbyBruno DelbCode review of the GreenWorld (GWD) tokenThis document reviews the source code of the GreenWorld token (GWD). This token is based on three contracts:Apr 10, 2023Apr 10, 2023
InCrypto DevOpsbyBruno DelbThe main vulnerabilities of the Solidity smart contractsIn this story, I list the main vulnerabilities of the Solidity smart contracts. Thanks to SWC Registry and CWE registries.Apr 10, 2023Apr 10, 2023