Forem

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

1
Comments
7 min read
The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

1
Comments
4 min read
The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

1
Comments
5 min read
Building a Deterministic Wallet Factory for EVM Chains with CreateX
Cover image for Building a Deterministic Wallet Factory for EVM Chains with CreateX

Building a Deterministic Wallet Factory for EVM Chains with CreateX

1
Comments
26 min read
The Truebit $26M Heist: How a Silent Integer Overflow in a Bonding Curve Drained an Entire Protocol

The Truebit $26M Heist: How a Silent Integer Overflow in a Bonding Curve Drained an Entire Protocol

1
Comments
6 min read
How to Get On-Chain RSI, EMA, and Bollinger Bands in Your AI Agent

How to Get On-Chain RSI, EMA, and Bollinger Bands in Your AI Agent

1
Comments
3 min read
Wallet Factory Determinista en Tron con TronBox
Cover image for Wallet Factory Determinista en Tron con TronBox

Wallet Factory Determinista en Tron con TronBox

Comments
30 min read
Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

1
Comments
3 min read
Building a Zero-Cost DeFi Audit Pipeline: Slither + Foundry + AI in Under 30 Minutes

Building a Zero-Cost DeFi Audit Pipeline: Slither + Foundry + AI in Under 30 Minutes

Comments
5 min read
Calldata Injection: The $17M Vulnerability Pattern Hiding in Every DeFi Router

Calldata Injection: The $17M Vulnerability Pattern Hiding in Every DeFi Router

Comments
6 min read
The OWASP Smart Contract Top 10 for 2026 Is Here — And Q1's $137M in Exploits Proves Exactly Why Each Entry Earned Its Spot

The OWASP Smart Contract Top 10 for 2026 Is Here — And Q1's $137M in Exploits Proves Exactly Why Each Entry Earned Its Spot

1
Comments
6 min read
The Balancer V2 Rounding Error: How 65 Micro-Swaps Drained $128M and Killed a Protocol

The Balancer V2 Rounding Error: How 65 Micro-Swaps Drained $128M and Killed a Protocol

Comments
5 min read
How Reentrancy Attacks Work in Solidity — and How to Prevent Them

How Reentrancy Attacks Work in Solidity — and How to Prevent Them

Comments
3 min read
Halmos + Foundry: How Symbolic Testing Catches the Bugs Your Fuzzer Will Never Find

Halmos + Foundry: How Symbolic Testing Catches the Bugs Your Fuzzer Will Never Find

Comments
5 min read
Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.