ICO Security
ICO Security Tips
PositiveWeb3
Web3 security researchers
Latest Posts
AIRA Lab Robonomics Smart Contracts Audit
Positive.com experts have assessed the source code of AIRA Lab Robonomics smart contracts.
Positive.com: ICO Projects Contain Five Security Vulnerabilities On Average
ICO security company launches Chainwatch, a real time monitoring product for ICOs.
Rewriting History: A Brief Introduction to Long Range Attacks
Proof of Stake protocols are in the spotlight as more and more high-profile blockchains attempt to switch over from Proof of Work…
PHDays 8: EtherHack Contest Writeup
This year at PHDays security conference a new contest called EtherHack was held. The goal was to be the first to solve all tasks which…
Predicting Random Numbers in Ethereum Smart Contracts
Ethereum has gained tremendous popularity as a platform for initial coin offerings (ICOs). However, it is used in more than just ERC20…
trade.io get their ICO off to a smart start
The team over at trade.io launched their “Trade Token” ICO on Ethereum on 7th December. Business has been brisk, with early investors…
Debugging EVM bytecode with radare2
Let’s continue our journey into the internals of EVM bytecode. In the last post we’ve taken a look at a simple contract and how to reverse…
Reversing EVM bytecode with radare2
Howdy ya’ll. Today we will look into the insides of Ethereum Virtual Machine (EVM), how Solidity language is translated into bytecode, how…
Mapping the ICO threat landscape
You’re already on the path for an ICO. Along with you, there are numerous people trying to do the same. Not all of them have that great…
ZeroNights ICO Hacking Contest Writeup
Prior to ZeroNights security conference, an ICO hacking contest had been announced. The first three contestants to solve the tasks could…
Reviews
Login to submit your review.