DEV Community

# solidity

For the Solidity programming language used on EVM chains.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Comments
7 min read
Reading a Smart Contract Is Just Reading Source Code—Why Are You Intimidated?

Reading a Smart Contract Is Just Reading Source Code—Why Are You Intimidated?

1
Comments
4 min read
The $14M Slippage Lesson: How AMM Price Impact Eats Your Lunch

The $14M Slippage Lesson: How AMM Price Impact Eats Your Lunch

Comments
4 min read
Deflationary Token Design Security: Why Flawed Burn Mechanisms Keep Getting Exploited in 2026

Deflationary Token Design Security: Why Flawed Burn Mechanisms Keep Getting Exploited in 2026

Comments
5 min read
The $17M Arbitrary External Call Exploit: How Unchecked call() Targets Drained SwapNet and Aperture Finance

The $17M Arbitrary External Call Exploit: How Unchecked call() Targets Drained SwapNet and Aperture Finance

Comments
6 min read
DeFi Governance Under Siege: Flash Loan Voting, Proposal Hijacking, and the 2026 Defense Playbook

DeFi Governance Under Siege: Flash Loan Voting, Proposal Hijacking, and the 2026 Defense Playbook

Comments
7 min read
Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Comments
4 min read
Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Comments
4 min read
The Venus Protocol $3.7M Exploit: How an Illiquid Token Drained a Top-10 BNB Chain Lending Protocol Today

The Venus Protocol $3.7M Exploit: How an Illiquid Token Drained a Top-10 BNB Chain Lending Protocol Today

Comments
6 min read
Transient Storage Security Playbook: 5 Patterns That Break When You TSTORE Your Reentrancy Guard

Transient Storage Security Playbook: 5 Patterns That Break When You TSTORE Your Reentrancy Guard

1
Comments
6 min read
The CrossCurve Bridge Heist: How Spoofed Axelar Messages Drained $3M Without a Single Legitimate Cross-Chain Transaction

The CrossCurve Bridge Heist: How Spoofed Axelar Messages Drained $3M Without a Single Legitimate Cross-Chain Transaction

Comments
8 min read
The Gondi NFT Lending Exploit: How a Missing Ownership Check Let Attackers Drain 78 NFTs Worth $230K

The Gondi NFT Lending Exploit: How a Missing Ownership Check Let Attackers Drain 78 NFTs Worth $230K

1
Comments
5 min read
Fuzzing DeFi Lending Invariants with Medusa: How Property-Based Testing Would Have Caught the Venus Protocol Exploit

Fuzzing DeFi Lending Invariants with Medusa: How Property-Based Testing Would Have Caught the Venus Protocol Exploit

Comments
4 min read
Uniswap V4 Hook Security: 8 Critical Attack Vectors Every DeFi Developer Must Audit Before Mainnet

Uniswap V4 Hook Security: 8 Critical Attack Vectors Every DeFi Developer Must Audit Before Mainnet

Comments
6 min read
Cross-Chain Bridges: The Distributed Consensus Problem Nobody Talks About

Cross-Chain Bridges: The Distributed Consensus Problem Nobody Talks About

1
Comments
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.