Smart contracts have been the biggest and most important developments in the blockchain space- Giving us the true meaning of …
-
-
Smart Contract AuditWeb3 Security
Explained: Create2 Opcode in Solidity
by ImmuneBytesby ImmuneBytesIntroduction The CREATE2 opcode is a robust feature within the Solidity language, enabling developers to create contracts at predetermined addresses …
-
Crypto Hacks DirectoryWeb3 Security
List of Crypto Hacks in the Month of January
by ImmuneBytesby ImmuneBytesJan 1 😈On Jan 1, 2022, DeFi Tinyman on Alogrand chain lost $3M worth of assets from its contract pools …
-
Overview In the context of blockchain and cryptocurrencies, “smurfing” is a term used to describe a tactic employed by individuals …
-
Overview Liquidity pool vulnerabilities refer to weaknesses and risks associated with decentralized finance (DeFi) liquidity pools, which are a crucial …
-
BlockchainWeb3 Security
Replay Attack in Blockchain Networks and Nodes
by ImmuneBytesby ImmuneBytesOverview A replay attack is a type of malicious activity where an attacker intercepts and retransmits a valid transaction or …
-
Overview In decentralized finance (DeFi), mirroring attacks refer to a type of exploit or vulnerability that can occur in DeFi …
-
Overview Pump-and-dump schemes in the context of NFTs (Non-Fungible Tokens) operate similarly to traditional pump-and-dump schemes but within the unique …
-
Crypto Hacks DirectoryWeb3 Security
List of Crypto Hacks in the Month of December
by ImmuneBytesby ImmuneBytesDec 1 😈On December 1, 2023, the FCN-TRUST (FCN) token On BSC was exploited for over $504k in a flash …
-
Overview Routing attacks are typically associated with blockchain network security and routing protocols used in traditional internet infrastructure. Routing attacks, …