ICO Security
ICO Security Tips
PositiveWeb3
Web3 security researchers
Latest Posts
Formal verification of smart contracts in the ConCert framework
In this article, I would like to discuss methods and tools for the formal verification of smart contracts…
How We Trained an LLM to Find Vulnerabilities in Solidity Smart Contracts
At Positive Web3, we live and breathe smart contract security. Our work revolves around analyzing vulnerabilities, researching exploits…
AIRA Lab Robonomics Smart Contracts Audit
Positive.com experts have assessed the source code of AIRA Lab Robonomics smart contracts.
Positive.com: ICO Projects Contain Five Security Vulnerabilities On Average
ICO security company launches Chainwatch, a real time monitoring product for ICOs.
Rewriting History: A Brief Introduction to Long Range Attacks
Proof of Stake protocols are in the spotlight as more and more high-profile blockchains attempt to switch over from Proof of Work…
PHDays 8: EtherHack Contest Writeup
This year at PHDays security conference a new contest called EtherHack was held. The goal was to be the first to solve all tasks which…
Predicting Random Numbers in Ethereum Smart Contracts
Ethereum has gained tremendous popularity as a platform for initial coin offerings (ICOs). However, it is used in more than just ERC20…
trade.io get their ICO off to a smart start
The team over at trade.io launched their “Trade Token” ICO on Ethereum on 7th December. Business has been brisk, with early investors…
Debugging EVM bytecode with radare2
Let’s continue our journey into the internals of EVM bytecode. In the last post we’ve taken a look at a simple contract and how to reverse…
Reversing EVM bytecode with radare2
Howdy ya’ll. Today we will look into the insides of Ethereum Virtual Machine (EVM), how Solidity language is translated into bytecode, how…
Reviews
Login to submit your review.