- 🎯 Introduction
- 📖 Why Blogs Matter
- 🔥 Must-Read Blogs
- 🌟 Must-Read Articles
- 🌐 Additional Blogs
- 🔗 Conclusion & Further Reading
Welcome to the ultimate list of blogs focusing on Smart Contract Security! Whether you're a developer, a security analyst, or just an enthusiast, these blogs will provide you with insights into the best practices, vulnerabilities, and cutting-edge techniques in smart contract security.
- Quick Updates: Blogs are often the first to report on new vulnerabilities and trends.
- Practical Advice: Many blogs offer actionable tips and code snippets.
- Expert Opinions: Gain insights from industry experts and thought leaders.
- About: ConsenSys Diligence is known for its in-depth research and insights into smart contract security.
- Topics Covered: Best Practices, Vulnerability Reports, Security Audits
- Link: ConsenSys Diligence Blog
- About: Trail of Bits has a long history of security research, and their blog is a treasure trove of information.
- Topics Covered: Security Audits, Tools, Vulnerabilities
- Link: Trail of Bits Blog
- About: OpenZeppelin is known for its secure smart contract libraries, and their blog offers great insights into smart contract development and security.
- Topics Covered: Development Tips, Security Libraries, Audits
- Link: OpenZeppelin Blog
- About: A comprehensive guide to smart contract security by ConsenSys.
- Topics Covered: Best Practices, Vulnerabilities
- Link: Smart Contract Security Best Practices
- About: A Hackernoon article that breaks down the essentials of smart contract vulnerabilities.
- Topics Covered: Vulnerabilities, Security Risks
- Link: Understanding Smart Contract Security
- About: A deep dive into smart contract vulnerabilities by Toptal.
- Topics Covered: Vulnerabilities, Security Risks
- Link: Smart Contract Vulnerabilities: A Comprehensive Guide
- Understanding Reentrancy Attacks
- How to Secure Your Smart Contracts: 6 Solidity Vulnerabilities and how to avoid them
- Smart Contract Security Best Practices
- Ethernaut CTF walkthrough with Brownie framework
- Sizing Solidity Audits
- Reversing Ethereum Smart Contracts
- Emin Gün Sirer, professor in Cornell Tech’s IC3 lab focused on blockchain security
- Phil Daian, grad student behind KEVM, Hydra, and other Ethereum academic projects
- Cybersecurity R&D firm with a blockchain security practice
- Martin Swende, programmer and appsec consultant
- Company blog about security issues and practices within blockchain ecosystem
- Solidity Security: Comprehensive list of known attack vectors
- Use cryptography in mobile apps the right way
- Security Risks in Asynchronous Web Servers: When Performance Optimizations Amplify the Impact of Data-Oriented Attacks
- Smart Contract Hacking: Incidents and Prevention
Smart contract security is a rapidly evolving field, and staying updated is crucial. The blogs listed above offer a wealth of information, from beginner guides to advanced techniques, to help you stay ahead in the game. For more resources, you can refer to the Learning Resources README.
If you come across any blog that you think should be featured here, feel free to contribute or reach out to us!