Introduction Airdrops, a mechanism to reward community members with tokens or NFTs, have become a popular strategy for NFT projects…
-
-
Crypto Hacks & ExploitsWeb3 Security
Remitano Crypto Exchange Lost $2.7 Millions in an Alleged Exploit
by ImmuneBytesOn Sept 14, Remitano exchange detected suspicious transactions across Ethereum and TRON blockchains, resulting in a $2.7 million loss. Swiftly,…
-
BlockchainSmart Contract AuditWeb3 Security
What is Mining Pool Manipulation in Blockchain Network?
by ImmuneBytesOverview Mining pool manipulation, also known as “pool manipulation,” refers to a scenario in the context of cryptocurrency mining, particularly…
-
Smart Contract AuditWeb3 Security
Solidity Vulnerability: Short Address Attack in EVM
by ImmuneBytesOverview Short Address Attack is a vulnerability where attackers exploit the characteristic of address encoding algorithms to ignore the trailing…
-
Smart Contract AuditWeb3 Security
Solidity Security Vulnerability: Function Default Visibilities
by ImmuneBytesIntroduction Solidity offers four visibility specifiers for functions: public, internal, private, and external. Incorrect use or neglect of these visibilities…
-
Crypto Hacks & ExploitsWeb3 Security
Conic Finance-Detailed Hack Analysis – July 21, 2023
by ImmuneBytesOn July 21, Defi Conic Finance suffered two significant exploits due to vulnerabilities in its smart contracts. These vulnerabilities led…
-
Crypto Hacks & ExploitsDeFiWeb3 Security
Token Supply Manipulation: A Potential Pitfall of DeFi
by ImmuneBytesOverview Token Supply Manipulation in the context of blockchain refers to the intentional alteration or control of the total supply…
-
Crypto Hacks & ExploitsNewsWeb3 Security
CoinEx Global Exploit – Sep 12, 2023-Detailed Hack Analysis
by ImmuneBytesOverview CoinEx Global, a well-known cryptocurrency exchange platform, has recently fallen victim to a significant security breach. The exploit led…
-
BlockchainCrypto Hacks & ExploitsWeb3 Security
What are Eclipse Attacks in Blockchain?
by ImmuneBytesIntroduction to Eclipse Attacks An Eclipse Attack occurs when an attacker is able to isolate a target node in a…
-
Smart Contract AuditWeb3 Security
Access Control Vulnerabilities in Solidity Smart Contracts
by ImmuneBytesIntroduction Access control is a critical aspect of smart contract security, governing who can interact with various functionalities within the…