Главная
Study mode:
on
1
Introduction
2
Common smart contract vulnerabilities
3
Example re-entrancy attack
4
Re-entrancy example in an AMM project
5
Short intro to delegatecall and selfdestruct
6
Constructor() vs Initialize()
7
OpenZeppelin's UUPS uninitialized proxy bug: explanation
8
Harvest Finance
9
Price oracles
10
Yearn.Finance spot-price usage
11
Yearn. Finance spot-price usage - explanation
12
Missing an authorization check
13
Lack of access control in cancelOrder() #1
14
Useful links to get you started
Description:
Explore the world of smart contract vulnerabilities in this conference talk from #NahamCon2022. Dive into common security issues, including re-entrancy attacks, delegatecall and selfdestruct functions, and initialization vulnerabilities. Examine real-world examples from AMM projects, OpenZeppelin's UUPS proxy bug, and Harvest Finance. Learn about the risks associated with price oracles and spot-price usage in DeFi protocols like Yearn.Finance. Discover the importance of proper authorization checks and access control in smart contract functions. Gain valuable insights and resources to enhance your understanding of smart contract security and potential haunting vulnerabilities.

Are Smart Contracts Haunted? - Security Vulnerabilities in Blockchain

NahamSec
Add to list
0:00 / 0:00