DEV Community

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Aderyn vs Slither in 2026: A Head-to-Head for Solidity Static Analysis

Aderyn vs Slither in 2026: A Head-to-Head for Solidity Static Analysis

Comments
4 min read
The Truebit Silent Overflow: How a 5-Year-Old Solidity Bug Let an Attacker Mint $26M in Tokens for Free

The Truebit Silent Overflow: How a 5-Year-Old Solidity Bug Let an Attacker Mint $26M in Tokens for Free

Comments
7 min read
The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

The DBXen ERC2771 Identity Confusion: Why _msgSender() msg.sender Is DeFi's Most Underrated Bug Class

1
Comments
5 min read
Building a Deterministic Wallet Factory for EVM Chains with CreateX

Building a Deterministic Wallet Factory for EVM Chains with CreateX

1
Comments
26 min read
The Truebit $26M Heist: How a Silent Integer Overflow in a Bonding Curve Drained an Entire Protocol

The Truebit $26M Heist: How a Silent Integer Overflow in a Bonding Curve Drained an Entire Protocol

1
Comments
6 min read
How to Get On-Chain RSI, EMA, and Bollinger Bands in Your AI Agent

How to Get On-Chain RSI, EMA, and Bollinger Bands in Your AI Agent

1
Comments
3 min read
Wallet Factory Determinista en Tron con TronBox

Wallet Factory Determinista en Tron con TronBox

Comments
30 min read
Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

Self-Reentrancy Attacks in Solidity: What the $2.73M Solv Protocol Exploit Teaches Us

1
Comments
3 min read
Building a Zero-Cost DeFi Audit Pipeline: Slither + Foundry + AI in Under 30 Minutes

Building a Zero-Cost DeFi Audit Pipeline: Slither + Foundry + AI in Under 30 Minutes

Comments
5 min read
Calldata Injection: The $17M Vulnerability Pattern Hiding in Every DeFi Router

Calldata Injection: The $17M Vulnerability Pattern Hiding in Every DeFi Router

Comments
6 min read
The OWASP Smart Contract Top 10 for 2026 Is Here — And Q1's $137M in Exploits Proves Exactly Why Each Entry Earned Its Spot

The OWASP Smart Contract Top 10 for 2026 Is Here — And Q1's $137M in Exploits Proves Exactly Why Each Entry Earned Its Spot

1
Comments
6 min read
The OWASP Smart Contract Top 10 (2026): A Practical Defense Playbook With Solidity and Anchor Code for Every Risk

The OWASP Smart Contract Top 10 (2026): A Practical Defense Playbook With Solidity and Anchor Code for Every Risk

Comments
6 min read
The Balancer V2 Rounding Error: How 65 Micro-Swaps Drained $128M and Killed a Protocol

The Balancer V2 Rounding Error: How 65 Micro-Swaps Drained $128M and Killed a Protocol

Comments
5 min read
How Reentrancy Attacks Work in Solidity — and How to Prevent Them

How Reentrancy Attacks Work in Solidity — and How to Prevent Them

Comments
3 min read
Halmos + Foundry: How Symbolic Testing Catches the Bugs Your Fuzzer Will Never Find

Halmos + Foundry: How Symbolic Testing Catches the Bugs Your Fuzzer Will Never Find

Comments
5 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.