Smart Contract Security: Identifying and Avoiding the 3 Most Common Exploits
A Comprehensive Guide for Developers to Enhance Smart Contract Security and Avoid Costly Exploits
A Comprehensive Guide for Developers to Enhance Smart Contract Security and Avoid Costly Exploits
Kindly find out below what we have achieved during the past 2 weeks.
Introducing Post-Audit Cover, our lasted product to provide protection even after a thorough audit.
Kindly find out below what we have achieved during the past 2 weeks.
Our Active Indexing Feature ensures instant retrieval of purchased covers, and here’s how we did it.
In case you missed our AMA with Bella Protocol, we talked about our recent FTX claims and more!
Total hacks in Feb: 29.
This shows the importance of security assessment, audit, code review, and of course, INSURACE.
There are also several types of other risks exposed such as price manipulation, oracle failures, private key/wallet compromise, rug pull, phishing attack, etc.