Skip to content

Latest commit

 

History

History
25 lines (23 loc) · 586 Bytes

README.md

File metadata and controls

25 lines (23 loc) · 586 Bytes

Best Practices

All attack vectors -

  • Reentrancy
  • Oracle Manipulation
  • Frontrunning
  • Denial of Service
  • Signature Replay
  • Malicious Honeypot
  • Unsafe Delegatecalls
  • Sandwich Attacks
  • Flash Loan Attacks
  • Griefing
  • Force Feeding
  • Cross-Chain Bridge manipulation
  • Insecure Randomness
  • Accessing Private Data
  • Phishing Through tx.origin
  • Arithmetic Over/Under Flow
  • Block timestamp Manipulation
  • Unsafe external calls
  • Unchecked return values
  • Proxy Storage Collision
  • Loops Gas Limit