All Questions
Tagged with attacks contract-development
10 questions
0
votes
1
answer
134
views
How do these 2 functions differ in terms of security?
How are these 2 functions different in terms of security, there was a question on a forum and i don't understand
function emergencyWithdraw(uint256 _pid) public {
PoolInfo storage pool = poolInfo[...
1
vote
1
answer
166
views
How can I demonstrate attacks on Quorum-based smart contracts in my local test network?
Currently, I am conducting a research regarding the security and privacy vulnerabilities of Quorum-based smart contracts. However, so far I've been struggling to implement attack vectors in order to ...
2
votes
1
answer
399
views
how do we use `commit/reveal` to count votes?
Let's say we are doing an election and it's easy to note that we need commit/reveal scheme to hide votes.
So, we store hashes while users commit their votes. Now, let's say the election is over. How ...
4
votes
3
answers
2k
views
how does commit/reveal solve front-running?
I am trying to make sure I understand something correctly, so I will pose a problem with a solution.
Problem:
Let's say commit has been called. After this, we call the reveal. attacker listens to ...
0
votes
2
answers
1k
views
how can we stop front running for `approve` [duplicate]
function approve(address _spender, uint256 _value) returns (bool success)
This is the ordinary ERC20 approval method. It's easy to figure out that we have a problem of front-running.
Alice gives ...
0
votes
1
answer
61
views
DaoAttack not working
I am trying to replicate the famous DAO attack for a cryptocurrencies course.
I have the following contract already deployed on the blockchain.
pragma solidity ^0.5.4;
contract EDao {
address ...
1
vote
1
answer
179
views
Risk of Messages Not Having a Signature
As per my understanding transactions are signed before sending to Ethereum. Else, no transfer of Ether will happen. However, messages sent to Smart Contracts (SC) aren't signed (e.g., using methods....
1
vote
1
answer
356
views
How does the exploit in FOMO3D work?
With the recent release of the FOMO3D exploit in its smart contract, how does the exploit work?
1
vote
1
answer
278
views
Unable to replicate short-address attack
I was reading about the short address attack and decided to replicate and test the possible solutions.
What I know about short address attack is if you skip n characters of your address, you end up ...
6
votes
1
answer
125
views
Could a proxy spigot contract have stopped the DAO fraud?
For anyone who doesn't know about the DAO exploit you can read up on it here.
It seems to me like the attack could have been stopped if payouts went through another contract that was really simple ...