Drawing of a hacker wearing a blue hoodie and sitting behind the red laptop, face hidden. We see the hacker through the layer of ones and zeros in the foreground.

12 Common Smart Contract Vulnerabilities and How To Address Them

Smart contracts provide a fundamental benefit by enabling us to verify the software that underlies a service and its actions without relying on trust in the service provider.   For a decentralized currency system to be adopted, it must be based on immutable rules, public auditability, and trust. This requires the use of secure and …

12 Common Smart Contract Vulnerabilities and How To Address Them Read More »