Zokyo Auditing Tutorials
Ctrlk
  • πŸ”Zokyo Auditing Tutorials
  • πŸ“šTutorials
    • πŸƒTutorial 1: Front-Running
    • 🧱Tutorial 2: Unsafe Casting
    • πŸ‘Tutorial 3: Approvals and Safe Approvals
    • ⛓️Tutorial 4: Block.chainid, DOMAIN_SEPARATOR and EIP-2612 permit
  • πŸ’°Tutorial 5: Fee-On-Transfer Tokens
  • 🌴Tutorial 6: Merkle Trees
  • 🌳Tutorial 7: Merkle-Patricia Trees
  • πŸ”Tutorial 8: Reentrancy
  • πŸ”‚Tutorial 9: Read-Only Reentrancy
  • πŸš†Tutorial 10: ERC20 transfer() and safeTransfer()
  • πŸ“žTutorial 11: Low level .call(), .transfer() and .send()
  • ☎️Tutorial 12: Delegatecall Vulnerabilities in Precompiled Contracts
  • 🌊Tutorial 13: Liquid Staking
  • 🚿Tutorial 14: Slippage
  • πŸ“‰Tutorial 15: Oracles
  • 🧠Tutorial 16: Zero Knowledge (ZK)
  • 🀝Tutorial 17 DEX's (Decentralized Exchanges)
  • πŸ€–Tutorial 18: Proxies
  • πŸ”žTutorial 19: 18 Decimal Assumption
  • βž—Tutorial 20: Arithmetic
  • πŸ”Tutorial 21: Unbounded Loops
  • πŸ“”Tutorial 22: `isContract`
  • πŸ’΅Tutorial 23: Staking
  • ⛓️Tutorial 24: Chain Re-org Vulnerability
  • πŸŒ‰Tutorial 25: Cross Chain Bridges Vulnerabilities
  • 🚰Tutorial 26: Integer Underflow and Overflow Vulnerabilities in Solidity (Before 0.8.0)
  • πŸ₯Tutorial 27: OpenZeppelin Vulnerabilities
  • πŸ–ŠοΈTutorial 28: Signature Vulnerabilities / Replays
  • 🀝Tutorial 29: Solmate Vulnerabilities
  • 🧱Tutorial 30: Inconsistent block lengths across chains
  • πŸ’‰Tutorial 31: NFT JSON and XSS injection
  • πŸƒTutorial 32: Merkle Leafs
  • 0️Tutorial 33: Layer 0
  • ♻️Tutorial 34: Forgetting to Update the Global State in Smart Contracts
  • ‼️Tutorial 35: Wrong Function Signature
  • πŸ›‘Tutorial 36: Handling Edge Cases of Banned Addresses in DeFi
  • Tutorial 37: initializer and onlyInitializing
  • βž—Tutorial 38: Eigen Layer
  • ⚫Tutorial 39: Wormhole
  • πŸ’ΌTutorial 40: Uniswap V3
  • πŸ”’Tutorial 41: Multiple Token Addresses in Proxied Tokens
  • πŸ€–Tutorial 42: abiDecoder v2
  • ❓Tutorial 43: On-Chain Randomness
  • πŸ˜–Tutorial 44: Weird ERC20 Tokens
  • πŸ”¨Tutorial 45: Hardcoded stable coin values
  • ❀️Tutorial 46: The Risks of Chainlink Heartbeat Discrepancies in Smart Contracts
  • πŸ‘£Tutorial 47: The Risk of Forgetting a Withdrawal Mechanism in Smart Contracts
  • πŸ’»Tutorial 48: Governance and Voting
  • πŸ“•Tutorial 49: Not Conforming To EIP standards
  • ⏳Tutorial 50: Vesting
  • β›½Tutorial 51: Ethereum's 63/64 Gas Rule
  • πŸ“©Tutorial 52: NPM Dependency Confusion and Unclaimed Packages
  • 🎈Tutorial 53: Airdrops
  • 🎯Tutorial 54: Precision
  • Tutorial 55: AssetIn == AssetOut, FromToken == ToToken
  • 🚿Tutorial 56: Vulnerabilities Related to LP Tokens Being the Same as Reward Tokens
  • Tutorial 57: Unsanitized SWAP Paths and Arbitrary Contract Call Vulnerabilities
  • Tutorial 58: The Risk of Infinite Approvals and Arbitrary Contract Calls
  • Tutorial 59: Low-Level Calls in Solidity Returning True for Non-Existent Contracts
  • 0️⃣Tutorial 60: The Impact of PUSH0 and the Shanghai Hardfork on Cross-Chain Deployments > 0.8.20
  • 🐍Tutorial 61: Vyper Vulnerable Versions
  • ⌨️Tutorial 62: Typos in Smart Contracts β€” The Silent Threat Leading to Interface Mismatch
  • ☁️Tutorial 63: Balance Check Using ==
  • πŸ’Tutorial 64: Equal Royalties for Unequal NFTs
  • πŸ–ΌοΈTutorial 65: ERC721 and NFTs
  • 2️⃣Tutorial 66: Vulnerability Arising from NFTs Supporting Both ERC721 and ERC1155 Standards
  • πŸ“·Tutorial 67: ERC1155 Vulnerabilities
  • πŸͺŸInformational Vulnerabilities
  • β›½Gas Efficiency
  • πŸ’»Automation Tools
  • πŸ”œOut Of Gas (Coming Soon)
  • πŸ”œDEX Aggregators (Coming Soon)
  • πŸ”œBribes (Coming Soon)
  • πŸ”œUnderstanding Compiled Bytecode (coming soon)
  • πŸ”œDeployment Mistakes (coming soon)
  • πŸ”œOptimistic Roll-ups (coming soon)
  • πŸ”œTypos (coming soon)
  • πŸ”œTry-Catch (coming soon)
  • πŸ”œNFT Market-place (coming soon)
  • πŸ”œUpgrade-able Contracts (coming soon)
Powered by GitBook
On this page

πŸ”œTypos (coming soon)

PreviousOptimistic Roll-ups (coming soon)NextTry-Catch (coming soon)