Skip to content

Latest commit

 

History

History
31 lines (26 loc) · 671 Bytes

README.md

File metadata and controls

31 lines (26 loc) · 671 Bytes

Best Practices

All attack vectors -

  • Reentrancy
  • Oracle Manipulation
  • Frontrunning
  • Denial of Service
  • Signature Replay
  • Malicious Honeypot
  • Unsafe Delegatecalls
  • Sandwich Attacks
  • Flash Loan Attacks
  • Griefing
  • Force Feeding
  • Cross-Chain Bridge manipulation
  • Insecure Randomness
  • Accessing Private Data
  • Phishing Through tx.origin
  • Arithmetic Over/Under Flow
  • Block timestamp Manipulation
  • Unsafe external calls
  • Unchecked return values
  • Proxy Storage Collision
  • Loops Gas Limit

Resources

Rekt news

// TODO: Explain about all the vulns