Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion docs/attacks/denial-of-service.md
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ contract Auction {
}
```

If attacker bids using a smart contract which has a fallback function that reverts any payment, the
If the attacker bids using a smart contract which has a fallback function that reverts any payment, the
attacker can win any auction. When it tries to refund the old leader, it reverts if the refund
fails. This means that a malicious bidder can become the leader while making sure that any refunds
to their address will *always* fail. In this way, they can prevent anyone else from calling the
Expand Down
2 changes: 1 addition & 1 deletion docs/attacks/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -15,5 +15,5 @@ writing smart contracts.
| [Denial of Service](./denial-of-service.md) | Denial of service attacks through unexpected reverts and the block gas limit. |
| [Griefing](./griefing.md) | Attacks relating to bad faith players around a smart contract system. |
| [Force Feeding](./force-feeding.md) | Forcing Ether to be sent to smart contracts to manipulate balance checks. |
| [Deprecated/Historical](./deprecated.md) | Attacks that are part of Ethereum's history and vulnerabilities that have been fixes on a (Solidity) compiler level. |
| [Deprecated/Historical](./deprecated.md) | Attacks that are part of Ethereum's history and vulnerabilities that have been fixed on a (Solidity) compiler level. |
| [More](./more.md) | Where to find more information about vulnerabilities and weaknesses. |
2 changes: 1 addition & 1 deletion docs/bug-bounty-programs.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ hide:
Looking for comprehensive information on setting up, managing, and operating a bug bounty program? Please refer to the [Smart Contract Security Field Guide's](https://scsfg.io/developers/bug-bounty/) bug bounty guide. This resource provides in-depth, up-to-date knowledge and strategies that are paramount for running a successful bug bounty program.


Over the course of time Ethereum security has evolved to include different flavours of bug bounty programs which will be detailed below:
Over the course of time Ethereum security has evolved to include different flavors of bug bounty programs which will be detailed below:

### Bug Bounty Platforms

Expand Down
4 changes: 2 additions & 2 deletions docs/security-tools/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,12 @@ code quality to reduce the likelihood and impact of vulnerabilities.
| Category | Description |
| --------------------------------------------------------------- | --------------------------------------------------------------------------------------------------- |
| [Visualization](./visualization.md) | These tools are aimed at visualizing, EVM bytecode, smart contracts, and their control flow graphs. |
| [Static and Dynamic Analysis](./static-and-dynamic-analysis.md) | Tools that employ various means of program analysis to find vulnabilities and weaknesses. |
| [Static and Dynamic Analysis](./static-and-dynamic-analysis.md) | Tools that employ various means of program analysis to find vulnerabilities and weaknesses. |
| [Classification](./classification.md) | Resources attempting to classify vulnerabilities and weaknesses in smart contracts. |
| [Testing](./testing.md) | Tools for running, measuring, and managing smart contract related tests. |
| [Linters and Formatters](./linters-and-formatters.md) | Any tools that highlight code smells and make smart contract code adhere to format standards. |
| [Disassemblers and Decompilers](./disassemblers.md) | Tools that translate smart contract bytecode into opcodes and solidity code. |
| [Formal and Runtime Verification](./verification.md) | Tools employing verification techniques to detect behaviour satisfying or vioating invariants. |
| [Formal and Runtime Verification](./verification.md) | Tools employing verification techniques to detect behaviour satisfying or violating invariants. |

<div class="security-tools-wrapper">
<div class="inner-wrapper">
Expand Down
2 changes: 1 addition & 1 deletion docs/security-tools/static-and-dynamic-analysis.md
Original file line number Diff line number Diff line change
Expand Up @@ -30,4 +30,4 @@
- [sFuzz](https://sfuzz.github.io/) - Efficient fuzzer inspired from AFL to find common
vulnerabilities.
- [Vertigo](https://github.com/JoranHonig/vertigo) - Mutation Testing for Ethereum Smart Contracts.
- [SolidityScan](https://solidityscan.com/) - Vulnerability Scanner for Solidity Smart Contracts with over 200+ exploit and CVEs, misconfigurations, and gas optimization modules.
- [SolidityScan](https://solidityscan.com/) - Vulnerability Scanner for Solidity Smart Contracts with over 200+ exploits and CVEs, misconfigurations, and gas optimization modules.