Skip to main content

All Questions

Filter by
Sorted by
Tagged with
0 votes
1 answer
134 views

How do these 2 functions differ in terms of security?

How are these 2 functions different in terms of security, there was a question on a forum and i don't understand function emergencyWithdraw(uint256 _pid) public { PoolInfo storage pool = poolInfo[...
Doug's user avatar
  • 1
1 vote
1 answer
166 views

How can I demonstrate attacks on Quorum-based smart contracts in my local test network?

Currently, I am conducting a research regarding the security and privacy vulnerabilities of Quorum-based smart contracts. However, so far I've been struggling to implement attack vectors in order to ...
Cheyenne Slager's user avatar
2 votes
1 answer
399 views

how do we use `commit/reveal` to count votes?

Let's say we are doing an election and it's easy to note that we need commit/reveal scheme to hide votes. So, we store hashes while users commit their votes. Now, let's say the election is over. How ...
Nika Kurashvili's user avatar
4 votes
3 answers
2k views

how does commit/reveal solve front-running?

I am trying to make sure I understand something correctly, so I will pose a problem with a solution. Problem: Let's say commit has been called. After this, we call the reveal. attacker listens to ...
Nika Kurashvili's user avatar
0 votes
2 answers
1k views

how can we stop front running for `approve` [duplicate]

function approve(address _spender, uint256 _value) returns (bool success) This is the ordinary ERC20 approval method. It's easy to figure out that we have a problem of front-running. Alice gives ...
Nika Kurashvili's user avatar
0 votes
1 answer
61 views

DaoAttack not working

I am trying to replicate the famous DAO attack for a cryptocurrencies course. I have the following contract already deployed on the blockchain. pragma solidity ^0.5.4; contract EDao { address ...
DebaSen's user avatar
  • 35
1 vote
1 answer
179 views

Risk of Messages Not Having a Signature

As per my understanding transactions are signed before sending to Ethereum. Else, no transfer of Ether will happen. However, messages sent to Smart Contracts (SC) aren't signed (e.g., using methods....
Dilum Bandara's user avatar
1 vote
1 answer
356 views

How does the exploit in FOMO3D work?

With the recent release of the FOMO3D exploit in its smart contract, how does the exploit work?
Patoshi パトシ's user avatar
1 vote
1 answer
278 views

Unable to replicate short-address attack

I was reading about the short address attack and decided to replicate and test the possible solutions. What I know about short address attack is if you skip n characters of your address, you end up ...
Prashant Prabhakar Singh's user avatar
6 votes
1 answer
125 views

Could a proxy spigot contract have stopped the DAO fraud?

For anyone who doesn't know about the DAO exploit you can read up on it here. It seems to me like the attack could have been stopped if payouts went through another contract that was really simple ...
hadees's user avatar
  • 283