Are Smart Contracts Haunted? - Security Vulnerabilities in Blockchain
Offered By: NahamSec via YouTube
Course Description
Overview
Explore the world of smart contract vulnerabilities in this conference talk from #NahamCon2022. Dive into common security issues, including re-entrancy attacks, delegatecall and selfdestruct functions, and initialization vulnerabilities. Examine real-world examples from AMM projects, OpenZeppelin's UUPS proxy bug, and Harvest Finance. Learn about the risks associated with price oracles and spot-price usage in DeFi protocols like Yearn.Finance. Discover the importance of proper authorization checks and access control in smart contract functions. Gain valuable insights and resources to enhance your understanding of smart contract security and potential haunting vulnerabilities.
Syllabus
Introduction
Common smart contract vulnerabilities
Example re-entrancy attack
Re-entrancy example in an AMM project
Short intro to delegatecall and selfdestruct
Constructor() vs Initialize()
OpenZeppelin's UUPS uninitialized proxy bug: explanation
Harvest Finance
Price oracles
Yearn.Finance spot-price usage
Yearn. Finance spot-price usage - explanation
Missing an authorization check
Lack of access control in cancelOrder() #1
Useful links to get you started
Taught by
NahamSec
Related Courses
Cybersecurity and Its Ten DomainsUniversity System of Georgia via Coursera Bases de données relationnelles : Comprendre pour maîtriser
Inria (French Institute for Research in Computer Science and Automation) via France Université Numerique Desarrollo de Aplicaciones Web: Seguridad
University of New Mexico via Coursera Web Application Development: Security
University of New Mexico via Coursera Computing, Storage and Security with Google Cloud Platform
Google via Coursera