DEV Community

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Comments
2 min read
On-Chain RSI: How to Read Live Technical Indicators From a Solidity Smart Contract

On-Chain RSI: How to Read Live Technical Indicators From a Solidity Smart Contract

Comments
6 min read
Your private key doesn't belong in your terminal. Here's the Foundry fix.

Your private key doesn't belong in your terminal. Here's the Foundry fix.

Comments
2 min read
Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Audit Speed: Hunting NFT Theft in V11 Finance (Duplicate Story) Subtitle: Why being right is only half the battle in Web3 security.

Comments
2 min read
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

1
Comments
9 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
The $58K ACPRoute Exploit: How a Single `memory` Keyword Let an Attacker Double-Claim Every Escrow on an AI Agent Commerce Protocol

The $58K ACPRoute Exploit: How a Single `memory` Keyword Let an Attacker Double-Claim Every Escrow on an AI Agent Commerce Protocol

Comments
6 min read
Aderyn vs Slither in 2026: The Rust-vs-Python Static Analysis Showdown That Decides Your CI/CD Pipeline's Future

Aderyn vs Slither in 2026: The Rust-vs-Python Static Analysis Showdown That Decides Your CI/CD Pipeline's Future

1
Comments
6 min read
The Resolv Labs $25M Exploit Autopsy: 5 Off-Chain Trust Boundaries Every Stablecoin Protocol Must Enforce

The Resolv Labs $25M Exploit Autopsy: 5 Off-Chain Trust Boundaries Every Stablecoin Protocol Must Enforce

Comments
5 min read
Breaking DeFi Math: Using Foundry Fuzzing to Prove Critical Precision Loss

Breaking DeFi Math: Using Foundry Fuzzing to Prove Critical Precision Loss

Comments
1 min read
Non-Standard ERC-20 Behavior: The Phantom Deposit Bug Class That Auditors Keep Missing

Non-Standard ERC-20 Behavior: The Phantom Deposit Bug Class That Auditors Keep Missing

Comments
7 min read
Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Comments
6 min read
The $25M Resolv USR Exploit: Why Your Minting Function's Off-Chain Signer Is the Biggest Single Point of Failure in DeFi

The $25M Resolv USR Exploit: Why Your Minting Function's Off-Chain Signer Is the Biggest Single Point of Failure in DeFi

1
Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.