Forem

Natachi profile picture

Natachi

Blockchain Developer

Education

University of Port Harcourt

Work

Web3 Developer

How Chainlink VRF Works
Cover image for How Chainlink VRF Works

How Chainlink VRF Works

1
Comments
2 min read
Attack Vectors in Solidity: Signature Verification Exploit
Cover image for Attack Vectors in Solidity: Signature Verification Exploit

Attack Vectors in Solidity: Signature Verification Exploit

Comments
3 min read
Exploring the Elliptic Curve Digital Signature Algorithm (ECDSA) for Blockchain Security
Cover image for Exploring the Elliptic Curve Digital Signature Algorithm (ECDSA) for Blockchain Security

Exploring the Elliptic Curve Digital Signature Algorithm (ECDSA) for Blockchain Security

1
Comments
2 min read
Ethernaut Challenge #01 Fallback
Cover image for Ethernaut Challenge #01 Fallback

Ethernaut Challenge #01 Fallback

Comments
2 min read
Attack Vectors in Solidity #10: Short Address Attack
Cover image for Attack Vectors in Solidity #10: Short Address Attack

Attack Vectors in Solidity #10: Short Address Attack

1
Comments
3 min read
Attack Vectors in Solidity #09: Bad randomness, also known as the "nothing is secret" attack
Cover image for Attack Vectors in Solidity #09: Bad randomness, also known as the "nothing is secret" attack

Attack Vectors in Solidity #09: Bad randomness, also known as the "nothing is secret" attack

1
Comments
3 min read
Attack Vectors in Solidity #8: Denial of Service
Cover image for Attack Vectors in Solidity #8: Denial of Service

Attack Vectors in Solidity #8: Denial of Service

Comments
5 min read
Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)
Cover image for Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Attack Vectors in Solidity #7: Right-To-Left-Override control character (U+202E)

Comments
2 min read
Attack Vectors in Solidity #6:Unexpected Ether( Incorrect Use of this.balance)
Cover image for Attack Vectors in Solidity #6:Unexpected Ether( Incorrect Use of this.balance)

Attack Vectors in Solidity #6:Unexpected Ether( Incorrect Use of this.balance)

1
Comments
4 min read
Attack Vectors in Solidity #5: Signature Replay Attacks
Cover image for Attack Vectors in Solidity #5: Signature Replay Attacks

Attack Vectors in Solidity #5: Signature Replay Attacks

Comments
2 min read
Attack Vectors in Solidity #4: Unencrypted Private Data On-Chain
Cover image for Attack Vectors in Solidity #4: Unencrypted Private Data On-Chain

Attack Vectors in Solidity #4: Unencrypted Private Data On-Chain

Comments
3 min read
Attack Vectors in Solidity #3: Reentrancy Vulnerabilities
Cover image for Attack Vectors in Solidity #3: Reentrancy Vulnerabilities

Attack Vectors in Solidity #3: Reentrancy Vulnerabilities

1
Comments
4 min read
Attack Vectors in Solidity #2: Controlled DeligateCall

Attack Vectors in Solidity #2: Controlled DeligateCall

1
Comments
3 min read
Attack Vectors in Solidity #1: Inappropriate Access Control
Cover image for Attack Vectors in Solidity #1: Inappropriate Access Control

Attack Vectors in Solidity #1: Inappropriate Access Control

1
Comments 1
2 min read
loading...