How to Debug Ethereum Smart Contract
Read Time: 5 minutes Debugging a smart contract transaction in the blockchain is different from debugging a traditional application build on c++ or JavaScript
Read Time: 5 minutes Debugging a smart contract transaction in the blockchain is different from debugging a traditional application build on c++ or JavaScript
Read Time: 4 minutes We’ve been asked by the MaesterProtocol team to review and audit their smart contracts. We at QuillAudits are a team
Read Time: 5 minutes We’ve been asked by the Discovery IOT team to review and audit their smart contracts. We at QuillAudits are a
Read Time: 5 minutes We’ve been asked by the ASMX team to review and audit their smart contracts. We at QuillAudits are a team
Read Time: 7 minutes We’ve been asked by the BlockWRK team to review and audit their smart contract. We at Quillhash Technologies are a
Read Time: 2 minutes High vulnerability issues: Unmet condition in burnTokensForSale():- There is a requirement (tokens > 0) statement in the burnTokensForSale() function, where
Read Time: 5 minutes In this article, we are going to discuss the life cycle of smart contract development, what steps should be taken
Read Time: 5 minutes Debugging a smart contract transaction in the blockchain is different from debugging a traditional application build on c++ or JavaScript
Read Time: 4 minutes We’ve been asked by the MaesterProtocol team to review and audit their smart contracts. We at QuillAudits are a team
Read Time: 5 minutes We’ve been asked by the Discovery IOT team to review and audit their smart contracts. We at QuillAudits are a
Read Time: 5 minutes We’ve been asked by the ASMX team to review and audit their smart contracts. We at QuillAudits are a team
Read Time: 7 minutes We’ve been asked by the BlockWRK team to review and audit their smart contract. We at Quillhash Technologies are a
Read Time: 2 minutes High vulnerability issues: Unmet condition in burnTokensForSale():- There is a requirement (tokens > 0) statement in the burnTokensForSale() function, where
Read Time: 5 minutes In this article, we are going to discuss the life cycle of smart contract development, what steps should be taken
Due to the fact that Web3 technology is still in its infancy, new types of attacks are possible. Some attacks, like ice phishing, are specific to Web3, while others resemble credential phishing attacks.
#CyberSecurity
👇👇
Thoreum Finance on the BNB chain was exploited on January 18, 2023. The exploit resulted in the protocol losing approximately 2261 BNB (~$680K).
✔ Check out our latest article to learn more about how it happens.👇
👉 https://quillaudits.medium.com/decoding-thoreum-finance-exploit-quillaudits-199f090e9bac
#web3 #Security #Audit
Coinbase (COIN) users in the Eastern European country of Georgia were able to exploit a price bug that allowed them to cash out their holdings for 100 times the exchange rate, pocketing thousands of dollars in profit.
Parent Company
Quillhash delivers enterprise grade blockchain technology to leading companies worldwide.
Contact
Refer QuillAudits to Web3 projects for audits.
Thereby help us Secure web3 ecosystem.