Updating conversion, creating readmes
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome EVM Security [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
[38;5;12m [39m[38;2;255;187;0m[1m[4mAwesome EVM Security [0m[38;5;14m[1m[4m![0m[38;2;255;187;0m[1m[4mAwesome[0m[38;5;14m[1m[4m (https://awesome.re/badge.svg)[0m[38;2;255;187;0m[1m[4m (https://awesome.re)[0m
|
||||
|
||||
[38;5;14m[1m![0m[38;5;12mAwesome EVM Security[39m[38;5;14m[1m (awesome-evm-security.png)[0m[38;5;12m (https://github.com/kareniel/awesome-evm-security#readme)[39m
|
||||
|
||||
@@ -20,8 +20,7 @@
|
||||
|
||||
[38;2;255;187;0m[4mGuides[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mCryptoSec.info[0m[38;5;12m (https://cryptosec.info/) - Information to help beginners learn how to protect their funds against hackers and scammers.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSimplified[0m[38;5;14m[1m [0m[38;5;14m[1mRoadmap[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mBlockchain[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;12m [39m[38;5;12m(https://devansh.xyz/blockchain-security/2021/09/17/genesis-0x01.html)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mCovers[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mrudimentary[39m[38;5;12m [39m[38;5;12mtopics[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mone[39m[38;5;12m [39m[38;5;12mneeds[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mknow[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12morder[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mget[39m[38;5;12m [39m[38;5;12minto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mfield[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m
|
||||
[38;5;12mBlockchain[39m[38;5;12m [39m[38;5;12mSecurity.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSimplified Roadmap for Blockchain Security[0m[38;5;12m (https://devansh.xyz/blockchain-security/2021/09/17/genesis-0x01.html) - Covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mHow to become a smart contract auditor[0m[38;5;12m (https://cmichel.io/how-to-become-a-smart-contract-auditor/) - Frequently asked questions that are related to auditing and auditors can get their first job.[39m
|
||||
|
||||
[38;2;255;187;0m[4mGovernance[0m
|
||||
@@ -37,10 +36,9 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mShelling Out: The Origins of Money[0m[38;5;12m (https://nakamotoinstitute.org/shelling-out/) - Illustrates the value of collectibles in reducing social transaction costs.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mFoundations of Cryptoeconomic Systems[0m[38;5;12m (https://epub.wu.ac.at/7309/8/Foundations%20of%20Cryptoeconomic%20Systems.pdf) - This paper explores why the term[39m
|
||||
[38;5;12m"cryptoeconomics" is context dependent and proposes complementary micro, meso and macro definitions of the term.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mTowards[0m[38;5;14m[1m [0m[38;5;14m[1ma[0m[38;5;14m[1m [0m[38;5;14m[1mPractice[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mToken[0m[38;5;14m[1m [0m[38;5;14m[1mEngineering[0m[38;5;12m [39m[38;5;12m(https://blog.oceanprotocol.com/towards-a-practice-of-token-engineering-b02feeeff7ca)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mHow[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mwe[39m[38;5;12m [39m[38;5;12mdesign[39m[38;5;12m [39m[38;5;12mtokenized[39m[38;5;12m [39m[38;5;12mecosystems,[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12mincentives[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mdo[39m[38;5;12m [39m[38;5;12mwe[39m[38;5;12m [39m[38;5;12manalyze[39m[38;5;12m [39m[38;5;12mor[39m[38;5;12m [39m
|
||||
[38;5;12mverify[39m[38;5;12m [39m[38;5;12mthem?[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mCrash[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mMechanism[0m[38;5;14m[1m [0m[38;5;14m[1mDesign[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mCryptoeconomic[0m[38;5;14m[1m [0m[38;5;14m[1mApplications[0m[38;5;12m [39m[38;5;12m(https://medium.com/blockchannel/a-crash-course-in-mechanism-design-for-cryptoeconomic-applications-a9f06ab6a976)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIntroduces[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m
|
||||
[38;5;12mconcepts[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmechanism[39m[38;5;12m [39m[38;5;12mdesign,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mgives[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtaste[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12musefulness[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcryptocurrency[39m[38;5;12m [39m[38;5;12mworld.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mTowards a Practice of Token Engineering[0m[38;5;12m (https://blog.oceanprotocol.com/towards-a-practice-of-token-engineering-b02feeeff7ca) - How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mCrash[0m[38;5;14m[1m [0m[38;5;14m[1mCourse[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mMechanism[0m[38;5;14m[1m [0m[38;5;14m[1mDesign[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mCryptoeconomic[0m[38;5;14m[1m [0m[38;5;14m[1mApplications[0m[38;5;12m [39m[38;5;12m(https://medium.com/blockchannel/a-crash-course-in-mechanism-design-for-cryptoeconomic-applications-a9f06ab6a976)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mIntroduces[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mbasic[39m[38;5;12m [39m[38;5;12mconcepts[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mmechanism[39m[38;5;12m [39m[38;5;12mdesign,[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mgives[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mtaste[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mtheir[39m[38;5;12m [39m[38;5;12musefulness[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mcryptocurrency[39m[38;5;12m [39m[38;5;12mworld.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWTF Is QF[0m[38;5;12m (https://wtfisqf.com/?grant=&grant=&grant=&grant=&match=1000) - A simple explanation of quadratic funding.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBonding Curves Explained[0m[38;5;12m (https://yos.io/2018/11/10/bonding-curves) - What bonding curves are and their potential applications.[39m
|
||||
|
||||
@@ -48,23 +46,19 @@
|
||||
[38;5;12m- [39m[38;5;14m[1mDeFi Safety[0m[38;5;12m (https://www.defisafety.com/) - Best practices security score reviews.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mDASP Top 10 of 2018[0m[38;5;12m (https://dasp.co/) - Decentralized Application Security Project Top 10 vulnerabilities.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mIVSCS[0m[38;5;12m (https://immunefi.com/severity-updated/) - Immunefi Vulnerability Severity Classification System.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSmart[0m[38;5;14m[1m [0m[38;5;14m[1mContract[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVerification[0m[38;5;14m[1m [0m[38;5;14m[1mStandard[0m[38;5;12m [39m[38;5;12m(https://securing.github.io/SCSVS/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mfree[39m[38;5;12m [39m[38;5;12m14-part[39m[38;5;12m [39m[38;5;12mchecklist[39m[38;5;12m [39m[38;5;12mcreated[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mstandardize[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12msmart[39m[38;5;12m [39m[38;5;12mcontracts[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mdevelopers,[39m[38;5;12m [39m[38;5;12marchitects,[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||||
[38;5;12mreviewers[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mvendors.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSecureth[0m[38;5;14m[1m [0m[38;5;14m[1mguidelines[0m[38;5;12m [39m[38;5;12m(https://guidelines.secureth.org/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mAid[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12mformulating[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mown[39m[38;5;12m [39m[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mengineering[39m[38;5;12m [39m[38;5;12mprocess[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mgiving[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mcomplete[39m[38;5;12m [39m[38;5;12mpicture[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mdifferent[39m[38;5;12m [39m[38;5;12mconcerns[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mexpectations[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m
|
||||
[38;5;12msoftware[39m[38;5;12m [39m[38;5;12mprojects.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCryptoCurrency[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mStandard[0m[38;5;14m[1m [0m[38;5;14m[1m(CCSS)[0m[38;5;12m [39m[38;5;12m(https://cryptoconsortium.github.io/CCSS/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mrequirements[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcryptocurrencies,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mexchanges,[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications,[39m[38;5;12m [39m
|
||||
[38;5;12mand[39m[38;5;12m [39m[38;5;12mcryptocurrency[39m[38;5;12m [39m[38;5;12mstorage[39m[38;5;12m [39m[38;5;12msolutions.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSmart Contract Security Verification Standard[0m[38;5;12m (https://securing.github.io/SCSVS/) - A free 14-part checklist created to standardize the security of smart contracts for developers, architects, security reviewers and vendors.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecureth guidelines[0m[38;5;12m (https://guidelines.secureth.org/) - Aid you in formulating your own software engineering process by giving a complete picture of all the different concerns and expectations in your software projects.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mCryptoCurrency[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mStandard[0m[38;5;14m[1m [0m[38;5;14m[1m(CCSS)[0m[38;5;12m [39m[38;5;12m(https://cryptoconsortium.github.io/CCSS/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mset[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mrequirements[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mall[39m[38;5;12m [39m[38;5;12minformation[39m[38;5;12m [39m[38;5;12msystems[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mmake[39m[38;5;12m [39m[38;5;12muse[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcryptocurrencies,[39m[38;5;12m [39m[38;5;12mincluding[39m[38;5;12m [39m[38;5;12mexchanges,[39m[38;5;12m [39m[38;5;12mweb[39m[38;5;12m [39m[38;5;12mapplications,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mcryptocurrency[39m[38;5;12m [39m
|
||||
[38;5;12mstorage[39m[38;5;12m [39m[38;5;12msolutions.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe Solcurity Standard[0m[38;5;12m (https://github.com/Rari-Capital/solcurity) - Opinionated security and code quality standard for Solidity smart contracts.[39m
|
||||
|
||||
[38;2;255;187;0m[4mSystem Assets[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecurity Considerations in the Solidity documentation[0m[38;5;12m (https://docs.soliditylang.org/en/v0.8.6/security-considerations.html) - Lists some pitfalls and general security recommendations.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mEthereum[0m[38;5;14m[1m [0m[38;5;14m[1m2.0[0m[38;5;14m[1m [0m[38;5;14m[1mSpecifications[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mAudit[0m[38;5;14m[1m [0m[38;5;14m[1mReport[0m[38;5;12m [39m[38;5;12m(https://leastauthority.com/static/publications/LeastAuthority-Ethereum-2.0-Specifications-Audit-Report.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mSecurity[39m[38;5;12m [39m[38;5;12mAudit[39m[38;5;12m [39m[38;5;12mReport[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mEth2.0[39m[38;5;12m [39m[38;5;12mspec[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;12mLeast[39m[38;5;12m [39m[38;5;12mAuthority.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mEthereum 2.0 Specifications Security Audit Report[0m[38;5;12m (https://leastauthority.com/static/publications/LeastAuthority-Ethereum-2.0-Specifications-Audit-Report.pdf) - Security Audit Report of the Eth2.0 spec by Least Authority.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGetting Deep Into EVM[0m[38;5;12m (https://hackernoon.com/getting-deep-into-evm-how-ethereum-works-backstage-ac7efa1f0015) - An Ultimate, In-depth Explanation of How EVM Works.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mEthereum EVM illustrated[0m[38;5;12m (https://takenobu-hs.github.io/downloads/ethereum_evm_illustrated.pdf) - Exploring some mental models and implementations.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mEthereum Blockspace: Who Gets What and Why[0m[38;5;12m (https://www.aniccaresearch.tech/blog/ethereum-blockspace-who-gets-what-and-why) - Ethereum blockspace market structure.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mWhat[0m[38;5;14m[1m [0m[38;5;14m[1mIs[0m[38;5;14m[1m [0m[38;5;14m[1mUniswap[0m[38;5;14m[1m [0m[38;5;14m[1mand[0m[38;5;14m[1m [0m[38;5;14m[1mHow[0m[38;5;14m[1m [0m[38;5;14m[1mDoes[0m[38;5;14m[1m [0m[38;5;14m[1mIt[0m[38;5;14m[1m [0m[38;5;14m[1mWork?[0m[38;5;12m [39m[38;5;12m(https://academy.binance.com/en/articles/what-is-uniswap-and-how-does-it-work)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mWhat[39m[38;5;12m [39m[38;5;12mUniswap[39m[38;5;12m [39m[38;5;12mis,[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12mworks,[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mhow[39m[38;5;12m [39m[38;5;12myou[39m[38;5;12m [39m[38;5;12mcan[39m[38;5;12m [39m[38;5;12mswap[39m[38;5;12m [39m[38;5;12mtokens[39m[38;5;12m [39m[38;5;12mon[39m[38;5;12m [39m[38;5;12mit[39m[38;5;12m [39m[38;5;12msimply[39m[38;5;12m [39m[38;5;12mwith[39m[38;5;12m [39m[38;5;12man[39m[38;5;12m [39m[38;5;12mEthereum[39m[38;5;12m [39m
|
||||
[38;5;12mwallet.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mWhat Is Uniswap and How Does It Work?[0m[38;5;12m (https://academy.binance.com/en/articles/what-is-uniswap-and-how-does-it-work) - What Uniswap is, how it works, and how you can swap tokens on it simply with an Ethereum wallet.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mScaling EVM (Ethereum Virtual Machine)[0m[38;5;12m (https://capitalgram.com/posts/scaling-evm/) - How fast and far can the EVM based blockchain architecture still take us.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mL2Beat[0m[38;5;12m (https://l2beat.com/) - Transparent and verifiable insights into emerging layer two (L2) technologies.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mThe Non-Fungible Token Bible[0m[38;5;12m (https://opensea.io/blog/guides/non-fungible-tokens) - Everything you need to know about NFTs.[39m
|
||||
@@ -87,24 +81,23 @@
|
||||
[38;2;255;187;0m[4mVulnerabilities[0m
|
||||
[38;5;12m- [39m[38;5;14m[1mSWC Registry[0m[38;5;12m (https://swcregistry.io/) - Smart Contract Weakness Classification and Test Cases.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1m246 Findings[0m[38;5;12m (https://blog.trailofbits.com/2019/08/08/246-findings-from-our-smart-contract-audits-an-executive-summary/) - 246 Findings From Trail of Bits Smart Contract Audits.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mSurvey[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mEthereum[0m[38;5;14m[1m [0m[38;5;14m[1mSmart[0m[38;5;14m[1m [0m[38;5;14m[1mContracts[0m[38;5;12m [39m[38;5;12m(https://arxiv.org/pdf/2105.06974.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExplains[39m[38;5;12m [39m[38;5;12meight[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mlevel[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mblockchain[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m
|
||||
[38;5;12manalyzing[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpast[39m[38;5;12m [39m[38;5;12mexploitation[39m[38;5;12m [39m[38;5;12mcase[39m[38;5;12m [39m[38;5;12mscenarios[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthese[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mList[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;12m [39m[38;5;12m(https://github.com/runtimeverification/verified-smart-contracts/wiki/List-of-Security-Vulnerabilities)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcomprehensive[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12msmart[39m[38;5;12m [39m[38;5;12mcontract[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m
|
||||
[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mcompiled[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m[38;5;12msources.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mA[0m[38;5;14m[1m [0m[38;5;14m[1mSurvey[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;14m[1m [0m[38;5;14m[1min[0m[38;5;14m[1m [0m[38;5;14m[1mEthereum[0m[38;5;14m[1m [0m[38;5;14m[1mSmart[0m[38;5;14m[1m [0m[38;5;14m[1mContracts[0m[38;5;12m [39m[38;5;12m(https://arxiv.org/pdf/2105.06974.pdf)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mExplains[39m[38;5;12m [39m[38;5;12meight[39m[38;5;12m [39m[38;5;12mvulnerabilities[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mspecific[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mapplication[39m[38;5;12m [39m[38;5;12mlevel[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mblockchain[39m[38;5;12m [39m[38;5;12mtechnology[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12manalyzing[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mpast[39m[38;5;12m [39m
|
||||
[38;5;12mexploitation[39m[38;5;12m [39m[38;5;12mcase[39m[38;5;12m [39m[38;5;12mscenarios[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mthese[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mvulnerabilities.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mList[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mVulnerabilities[0m[38;5;12m [39m[38;5;12m(https://github.com/runtimeverification/verified-smart-contracts/wiki/List-of-Security-Vulnerabilities)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mA[39m[38;5;12m [39m[38;5;12mcomprehensive[39m[38;5;12m [39m[38;5;12mlist[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12mcommon[39m[38;5;12m [39m[38;5;12msmart[39m[38;5;12m [39m[38;5;12mcontract[39m[38;5;12m [39m[38;5;12msecurity[39m[38;5;12m [39m[38;5;12mvulnerabilities,[39m[38;5;12m [39m[38;5;12mcompiled[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mvarious[39m[38;5;12m [39m
|
||||
[38;5;12msources.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mList of Known Bugs[0m[38;5;12m (https://docs.soliditylang.org/en/v0.8.1/bugs.html) - A JSON-formatted list of some of the known security-relevant bugs in the Solidity compiler.[39m
|
||||
|
||||
[38;2;255;187;0m[4mControls[0m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSimple[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;12m [39m[38;5;12m(https://github.com/nascentxyz/simple-security-toolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpinionated[39m[38;5;12m [39m[38;5;12mrecommendations[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mNascent[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mappropriate,[39m[38;5;12m [39m[38;5;12mparticularly[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12mdeveloping[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmanaging[39m[38;5;12m [39m
|
||||
[38;5;12mearly[39m[38;5;12m [39m[38;5;12mversions[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mprotocol.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSimple[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;14m[1m [0m[38;5;14m[1mToolkit[0m[38;5;12m [39m[38;5;12m(https://github.com/nascentxyz/simple-security-toolkit)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mOpinionated[39m[38;5;12m [39m[38;5;12mrecommendations[39m[38;5;12m [39m[38;5;12mthat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mteam[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mNascent[39m[38;5;12m [39m[38;5;12mfind[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mbe[39m[38;5;12m [39m[38;5;12mappropriate,[39m[38;5;12m [39m[38;5;12mparticularly[39m[38;5;12m [39m[38;5;12mfor[39m[38;5;12m [39m[38;5;12mteams[39m[38;5;12m [39m[38;5;12mdeveloping[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mmanaging[39m[38;5;12m [39m[38;5;12mearly[39m[38;5;12m [39m[38;5;12mversions[39m[38;5;12m [39m[38;5;12mof[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m
|
||||
[38;5;12mprotocol.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mGnosis Safe[0m[38;5;12m (https://docs.gnosis-safe.io) - Multi-sig. Require multiple team members to confirm every transaction in order to execute it, which helps prevent unauthorized access to company crypto.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mList of DeFi auditors[0m[38;5;12m (https://www.defisafety.com/auditors) - List of DeFi auditors maintained by DeFiSafety.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mState[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mDeFi[0m[38;5;14m[1m [0m[38;5;14m[1mAudits[0m[38;5;12m [39m[38;5;12m(https://medium.com/conflux-network/the-overlooked-element-of-defi-adoption-e3b29829e3da)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mArticle[39m[38;5;12m [39m[38;5;12mtaking[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlook[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mauditing[39m[38;5;12m [39m[38;5;12mspace[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mits[39m[38;5;12m [39m[38;5;12mimportance[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12monboarding[39m[38;5;12m [39m[38;5;12musers[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mproperly[39m[38;5;12m [39m
|
||||
[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mnew[39m[38;5;12m [39m[38;5;12mDeFi[39m[38;5;12m [39m[38;5;12mprotocols.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mState[0m[38;5;14m[1m [0m[38;5;14m[1mof[0m[38;5;14m[1m [0m[38;5;14m[1mDeFi[0m[38;5;14m[1m [0m[38;5;14m[1mAudits[0m[38;5;12m [39m[38;5;12m(https://medium.com/conflux-network/the-overlooked-element-of-defi-adoption-e3b29829e3da)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mArticle[39m[38;5;12m [39m[38;5;12mtaking[39m[38;5;12m [39m[38;5;12ma[39m[38;5;12m [39m[38;5;12mlook[39m[38;5;12m [39m[38;5;12mat[39m[38;5;12m [39m[38;5;12mthe[39m[38;5;12m [39m[38;5;12mauditing[39m[38;5;12m [39m[38;5;12mspace[39m[38;5;12m [39m[38;5;12mand[39m[38;5;12m [39m[38;5;12mits[39m[38;5;12m [39m[38;5;12mimportance[39m[38;5;12m [39m[38;5;12min[39m[38;5;12m [39m[38;5;12monboarding[39m[38;5;12m [39m[38;5;12musers[39m[38;5;12m [39m[38;5;12mby[39m[38;5;12m [39m[38;5;12mproperly[39m[38;5;12m [39m[38;5;12msecuring[39m[38;5;12m [39m[38;5;12mnew[39m[38;5;12m [39m[38;5;12mDeFi[39m[38;5;12m [39m
|
||||
[38;5;12mprotocols.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mBuilding Secure Contracts[0m[38;5;12m (https://github.com/crytic/building-secure-contracts/) - Trail of Bits' guidelines and best practices on how to write secure smart contracts.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSolidity Patterns[0m[38;5;12m (https://fravoll.github.io/solidity-patterns/) - A compilation of patterns and best practices for the smart contract programming language Solidity.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSecurity Pattern for Ethereum and Solidity[0m[38;5;12m (https://docs.google.com/spreadsheets/d/1PF4QZudW6Z7EV4hqQfwPo3A43AVqPrsuzzzey5yRYcs/edit#gid=0) - Google Sheets Checklists.[39m
|
||||
[38;5;12m-[39m[38;5;12m [39m[38;5;14m[1mSolidity[0m[38;5;14m[1m [0m[38;5;14m[1mBest[0m[38;5;14m[1m [0m[38;5;14m[1mPractices[0m[38;5;14m[1m [0m[38;5;14m[1mfor[0m[38;5;14m[1m [0m[38;5;14m[1mSmart[0m[38;5;14m[1m [0m[38;5;14m[1mContract[0m[38;5;14m[1m [0m[38;5;14m[1mSecurity[0m[38;5;12m [39m[38;5;12m(https://consensys.net/blog/developers/solidity-best-practices-for-smart-contract-security/)[39m[38;5;12m [39m[38;5;12m-[39m[38;5;12m [39m[38;5;12mPro[39m[38;5;12m [39m[38;5;12mtips[39m[38;5;12m [39m[38;5;12mfrom[39m[38;5;12m [39m[38;5;12mConsensys[39m[38;5;12m [39m[38;5;12mto[39m[38;5;12m [39m[38;5;12mensure[39m[38;5;12m [39m[38;5;12myour[39m[38;5;12m [39m[38;5;12mEthereum[39m[38;5;12m [39m[38;5;12msmart[39m[38;5;12m [39m
|
||||
[38;5;12mcontracts[39m[38;5;12m [39m[38;5;12mare[39m[38;5;12m [39m[38;5;12mfortified.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSolidity Best Practices for Smart Contract Security[0m[38;5;12m (https://consensys.net/blog/developers/solidity-best-practices-for-smart-contract-security/) - Pro tips from Consensys to ensure your Ethereum smart contracts are fortified.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mCERtified[0m[38;5;12m (https://cer.live/) - Top 100 exchanges by Cybersecurity rating.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mSmart Contract Security Registry[0m[38;5;12m (https://github.com/ethereum-lists/contracts) - An effort to identify deployed contracts instances given their chain and address, by listing the project they belong to.[39m
|
||||
[38;5;12m- [39m[38;5;14m[1mForta[0m[38;5;12m (https://docs.forta.network/) - Community-based runtime security network for smart contracts.[39m
|
||||
|
||||
Reference in New Issue
Block a user