Understanding the stack based architecture of EVMIntroduction: In this article I will shed light on the architecture of EVM and why flaws like stack-too-deep occur in smart contractsNov 18, 2023Nov 18, 2023
How Solidity 0.8 protect against integer underflow/overflow and how they can still happenWhen solidity 0.8 was rolled out in Dec 2020 it solved a very characteristic problem in the language, integer under & overflow, that used…May 14, 2023May 14, 2023
How You Can Escalate a Simple HTML Injection Into a Critical SSRFSSRF or Server Side Request Forgery is a type of vulnerability where the attacker can make the request on behalf of the vulnerable web…Jun 21, 20211Jun 21, 20211
Published inSystem WeaknessSimple 2-FA Bugs and Logic Flaws That You Can Look For As A BeginnerHello Everyone,Apr 2, 20211Apr 2, 20211