DEV Community

# solidity

For the Solidity programming language used on EVM chains.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Flash Loan Circuit Breakers: 5 On-Chain Defense Patterns That Would Have Stopped 80% of Q1 2026's $137M in DeFi Exploits

Comments
7 min read
How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

How Commit–Reveal Makes a 50-50 Coin Flip Actually Fair on Base

Comments
3 min read
Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

Smart Contract Security: Common Vulnerabilities and How to Avoid Them (Ethereum, Solana, BSC)

2
Comments
6 min read
Arbitrary External Calls: The $17M DEX Aggregator Attack Pattern That's Still Lurking in 90% of Swap Routers

Arbitrary External Calls: The $17M DEX Aggregator Attack Pattern That's Still Lurking in 90% of Swap Routers

Comments
5 min read
Mutation Testing for Solidity: The Audit Quality Metric Your Protocol Is Ignoring

Mutation Testing for Solidity: The Audit Quality Metric Your Protocol Is Ignoring

1
Comments
6 min read
VSCode 插件solidity-macos恶意扩展深度分析报告

VSCode 插件solidity-macos恶意扩展深度分析报告

1
Comments
5 min read
Week 1: Base — 56/60

Week 1: Base — 56/60

Comments
4 min read
5 Smart Contract Anti-Patterns That Cost DeFi $137M in Q1 2026 — And the Exact Code Fixes

5 Smart Contract Anti-Patterns That Cost DeFi $137M in Q1 2026 — And the Exact Code Fixes

Comments
5 min read
Beyond the Hype: The Actual Engineering Behind RWA Tokenization

Beyond the Hype: The Actual Engineering Behind RWA Tokenization

1
Comments
4 min read
Critical Security Alert: Malicious VSCode Extension "solidity-macos" Contains Backdoor

Critical Security Alert: Malicious VSCode Extension "solidity-macos" Contains Backdoor

1
Comments
9 min read
4th Exploit in 5 Years: How a 9-Month Donation Attack Bypassed Venus Protocol's Supply Cap for $2.15M

4th Exploit in 5 Years: How a 9-Month Donation Attack Bypassed Venus Protocol's Supply Cap for $2.15M

1
Comments
1 min read
Running a Validator on Push Chain: A Builder’s Guide

Running a Validator on Push Chain: A Builder’s Guide

1
Comments
3 min read
The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

The Q1 2026 DeFi Exploit Autopsy: $137M Lost, 15 Protocols Breached — The 5 Root Cause Patterns and the Free Audit Toolkit That Catches Each One

1
Comments
7 min read
The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

The Venus Protocol Donation Attack: How a 9-Month Ambush Turned a $14.5M Supply Cap Into a $53M Trojan Horse — And How to Donation-Proof Your Lending Fork

1
Comments
4 min read
Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Cross-Chain Governance Attacks: How Bridged Voting Power Creates a $2B Attack Surface — And 5 Defense Patterns Every DAO Needs Now

Comments
8 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.