DEV Community

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

1
Comments
9 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
The $58K ACPRoute Exploit: How a Single `memory` Keyword Let an Attacker Double-Claim Every Escrow on an AI Agent Commerce Protocol

The $58K ACPRoute Exploit: How a Single `memory` Keyword Let an Attacker Double-Claim Every Escrow on an AI Agent Commerce Protocol

Comments
6 min read
Aderyn vs Slither in 2026: The Rust-vs-Python Static Analysis Showdown That Decides Your CI/CD Pipeline's Future

Aderyn vs Slither in 2026: The Rust-vs-Python Static Analysis Showdown That Decides Your CI/CD Pipeline's Future

1
Comments
6 min read
The Resolv Labs $25M Exploit Autopsy: 5 Off-Chain Trust Boundaries Every Stablecoin Protocol Must Enforce

The Resolv Labs $25M Exploit Autopsy: 5 Off-Chain Trust Boundaries Every Stablecoin Protocol Must Enforce

Comments
5 min read
Breaking DeFi Math: Using Foundry Fuzzing to Prove Critical Precision Loss

Breaking DeFi Math: Using Foundry Fuzzing to Prove Critical Precision Loss

Comments
1 min read
Non-Standard ERC-20 Behavior: The Phantom Deposit Bug Class That Auditors Keep Missing

Non-Standard ERC-20 Behavior: The Phantom Deposit Bug Class That Auditors Keep Missing

Comments
7 min read
Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Comments
6 min read
The $25M Resolv USR Exploit: Why Your Minting Function's Off-Chain Signer Is the Biggest Single Point of Failure in DeFi

The $25M Resolv USR Exploit: Why Your Minting Function's Off-Chain Signer Is the Biggest Single Point of Failure in DeFi

1
Comments
7 min read
The DBXen ERC2771 Exploit: How _msgSender() and msg.sender Confusion Turned 1,085 Staking Cycles Into Instant Cash

The DBXen ERC2771 Exploit: How _msgSender() and msg.sender Confusion Turned 1,085 Staking Cycles Into Instant Cash

1
Comments
5 min read
Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Comments
7 min read
How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

Comments
3 min read
Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

2
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.