Skip to content

Latest commit

 

History

History
35 lines (29 loc) · 1.33 KB

README.md

File metadata and controls

35 lines (29 loc) · 1.33 KB

Best Practices

All attack vectors -

Serial No. Attack Vectors Description
1 Reentrancy
2 Oracle Manipulation
3 Frontrunning
4 Denial of Service
5 Signature Replay
6 Malicious Honeypot
7 Unsafe Delegatecalls
8 Sandwich Attacks
9 Flash Loan Attacks
10 Griefing
11 Force Feeding
12 Cross-Chain Bridge manipulation
13 Insecure Randomness
14 Accessing Private Data
15 Phishing Through tx.origin
16 Arithmetic Over/Under Flow
17 Block timestamp Manipulation
18 Unsafe external calls
19 Unchecked return values
20 Proxy Storage Collision
21 Loops Gas Limit

Resources

Rekt news

// TODO: Explain about all the vulns