DEV Community

Natachi profile picture

Natachi

Blockchain Developer

Education

University of Port Harcourt

Work

Web3 Developer

How Chainlink VRF Works

How Chainlink VRF Works

1
Comments
2 min read
Attack Vectors in Solidity: Signature Verification Exploit

Attack Vectors in Solidity: Signature Verification Exploit

Comments
3 min read
Exploring the Elliptic Curve Digital Signature Algorithm (ECDSA) for Blockchain Security

Exploring the Elliptic Curve Digital Signature Algorithm (ECDSA) for Blockchain Security

1
Comments
2 min read
Ethernaut Challenge #01 Fallback

Ethernaut Challenge #01 Fallback

Comments
2 min read
Attack Vectors in Solidity #10: Short Address Attack

Attack Vectors in Solidity #10: Short Address Attack

Comments
3 min read
Attack Vectors in Solidity #09: Bad randomness, also known as the "nothing is secret" attack

Attack Vectors in Solidity #09: Bad randomness, also known as the "nothing is secret" attack

1
Comments
3 min read
Attack Vectors in Solidity #8: Denial of Service

Attack Vectors in Solidity #8: Denial of Service

Comments
5 min read
Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Comments
2 min read
Attack Vectors in Solidity #6:Unexpected Ether( Incorrect Use of this.balance)

Attack Vectors in Solidity #6:Unexpected Ether( Incorrect Use of this.balance)

Comments
4 min read
Attack Vectors in Solidity #5: Signature Replay Attacks

Attack Vectors in Solidity #5: Signature Replay Attacks

Comments
2 min read
Attack Vectors in Solidity #4: Unencrypted Private Data On-Chain

Attack Vectors in Solidity #4: Unencrypted Private Data On-Chain

Comments
3 min read
Attack Vectors in Solidity #3: Reentrancy Vulnerabilities

Attack Vectors in Solidity #3: Reentrancy Vulnerabilities

1
Comments
4 min read
Attack Vectors in Solidity #2: Controlled DeligateCall

Attack Vectors in Solidity #2: Controlled DeligateCall

1
Comments
3 min read
Attack Vectors in Solidity #1: Inappropriate Access Control

Attack Vectors in Solidity #1: Inappropriate Access Control

1
Comments
2 min read
loading...