Zokyo Auditing Tutorials
search
Ctrlk
  • πŸ”Zokyo Auditing Tutorials
  • πŸ“šTutorials
    • πŸƒTutorial 1: Front-Runningchevron-right
    • 🧱Tutorial 2: Unsafe Castingchevron-right
    • πŸ‘Tutorial 3: Approvals and Safe Approvalschevron-right
    • ⛓️Tutorial 4: Block.chainid, DOMAIN_SEPARATOR and EIP-2612 permitchevron-right
  • πŸ’°Tutorial 5: Fee-On-Transfer Tokenschevron-right
  • 🌴Tutorial 6: Merkle Treeschevron-right
  • 🌳Tutorial 7: Merkle-Patricia Treeschevron-right
  • πŸ”Tutorial 8: Reentrancychevron-right
  • πŸ”‚Tutorial 9: Read-Only Reentrancychevron-right
  • πŸš†Tutorial 10: ERC20 transfer() and safeTransfer()chevron-right
  • πŸ“žTutorial 11: Low level .call(), .transfer() and .send()chevron-right
  • ☎️Tutorial 12: Delegatecall Vulnerabilities in Precompiled Contractschevron-right
  • 🌊Tutorial 13: Liquid Stakingchevron-right
  • 🚿Tutorial 14: Slippagechevron-right
  • πŸ“‰Tutorial 15: Oracleschevron-right
  • 🧠Tutorial 16: Zero Knowledge (ZK)chevron-right
  • 🀝Tutorial 17 DEX's (Decentralized Exchanges)chevron-right
  • πŸ€–Tutorial 18: Proxieschevron-right
  • πŸ”žTutorial 19: 18 Decimal Assumptionchevron-right
  • βž—Tutorial 20: Arithmeticchevron-right
  • πŸ”Tutorial 21: Unbounded Loopschevron-right
  • πŸ“”Tutorial 22: `isContract`chevron-right
  • πŸ’΅Tutorial 23: Stakingchevron-right
  • ⛓️Tutorial 24: Chain Re-org Vulnerabilitychevron-right
  • πŸŒ‰Tutorial 25: Cross Chain Bridges Vulnerabilitieschevron-right
  • 🚰Tutorial 26: Integer Underflow and Overflow Vulnerabilities in Solidity (Before 0.8.0)chevron-right
  • πŸ₯Tutorial 27: OpenZeppelin Vulnerabilitieschevron-right
  • πŸ–ŠοΈTutorial 28: Signature Vulnerabilities / Replayschevron-right
  • 🀝Tutorial 29: Solmate Vulnerabilitieschevron-right
  • 🧱Tutorial 30: Inconsistent block lengths across chainschevron-right
  • πŸ’‰Tutorial 31: NFT JSON and XSS injectionchevron-right
  • πŸƒTutorial 32: Merkle Leafschevron-right
  • 0️Tutorial 33: Layer 0chevron-right
  • ♻️Tutorial 34: Forgetting to Update the Global State in Smart Contracts
  • ‼️Tutorial 35: Wrong Function Signature
  • πŸ›‘Tutorial 36: Handling Edge Cases of Banned Addresses in DeFi
  • flag-checkeredTutorial 37: initializer and onlyInitializing
  • βž—Tutorial 38: Eigen Layerchevron-right
  • ⚫Tutorial 39: Wormholechevron-right
  • πŸ’ΌTutorial 40: Uniswap V3chevron-right
  • πŸ”’Tutorial 41: Multiple Token Addresses in Proxied Tokenschevron-right
  • πŸ€–Tutorial 42: abiDecoder v2chevron-right
  • ❓Tutorial 43: On-Chain Randomnesschevron-right
  • πŸ˜–Tutorial 44: Weird ERC20 Tokenschevron-right
  • πŸ”¨Tutorial 45: Hardcoded stable coin values
  • ❀️Tutorial 46: The Risks of Chainlink Heartbeat Discrepancies in Smart Contracts
  • πŸ‘£Tutorial 47: The Risk of Forgetting a Withdrawal Mechanism in Smart Contracts
  • πŸ’»Tutorial 48: Governance and Votingchevron-right
  • πŸ“•Tutorial 49: Not Conforming To EIP standardschevron-right
  • ⏳Tutorial 50: Vestingchevron-right
  • β›½Tutorial 51: Ethereum's 63/64 Gas Rulechevron-right
  • πŸ“©Tutorial 52: NPM Dependency Confusion and Unclaimed Packageschevron-right
  • 🎈Tutorial 53: Airdropschevron-right
  • 🎯Tutorial 54: Precisionchevron-right
  • equalsTutorial 55: AssetIn == AssetOut, FromToken == ToTokenchevron-right
  • 🚿Tutorial 56: Vulnerabilities Related to LP Tokens Being the Same as Reward Tokenschevron-right
  • shuffleTutorial 57: Unsanitized SWAP Paths and Arbitrary Contract Call Vulnerabilitieschevron-right
  • thumbs-upTutorial 58: The Risk of Infinite Approvals and Arbitrary Contract Callschevron-right
  • phone-flipTutorial 59: Low-Level Calls in Solidity Returning True for Non-Existent Contractschevron-right
  • 0️⃣Tutorial 60: The Impact of PUSH0 and the Shanghai Hardfork on Cross-Chain Deployments > 0.8.20chevron-right
  • 🐍Tutorial 61: Vyper Vulnerable Versionschevron-right
  • ⌨️Tutorial 62: Typos in Smart Contracts β€” The Silent Threat Leading to Interface Mismatchchevron-right
  • ☁️Tutorial 63: Balance Check Using ==chevron-right
  • πŸ’Tutorial 64: Equal Royalties for Unequal NFTschevron-right
  • πŸ–ΌοΈTutorial 65: ERC721 and NFTschevron-right
  • 2️⃣Tutorial 66: Vulnerability Arising from NFTs Supporting Both ERC721 and ERC1155 Standards
  • πŸ“·Tutorial 67: ERC1155 Vulnerabilitieschevron-right
  • πŸͺŸInformational Vulnerabilities
  • β›½Gas Efficiency
  • πŸ’»Automation Tools
  • πŸ”œOut Of Gas (Coming Soon)
  • πŸ”œDEX Aggregators (Coming Soon)
  • πŸ”œBribes (Coming Soon)
  • πŸ”œUnderstanding Compiled Bytecode (coming soon)
  • πŸ”œDeployment Mistakes (coming soon)
  • πŸ”œOptimistic Roll-ups (coming soon)
  • πŸ”œTypos (coming soon)
  • πŸ”œTry-Catch (coming soon)
  • πŸ”œNFT Market-place (coming soon)
  • πŸ”œUpgrade-able Contracts (coming soon)
gitbookPowered by GitBook
block-quoteOn this pagechevron-down

πŸ’»Automation Tools

circle-info

Book an audit with Zokyoarrow-up-right

https://zokyo-auditing-tutorials.gitbook.io/zokyo-automated-tools/arrow-up-right

PreviousGas Efficiencychevron-leftNextOut Of Gas (Coming Soon)chevron-right

Last updated 1 year ago