Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

I appreciate how organized the Consensys guide is laid out. It's pretty easy to read. Trail of Bits has a similar guide that is a little more in-the-weeds technically. It also covers, what we think is, essential background about certain automated analysis techniques like static analysis and how fuzzers work. Check it out!

https://secure-contracts.com/



Hi Dan! Small correction: This is not a ConsenSys guide. It's my own work. As a private person. :) More content on offensive security techniques is yet to come, so stay tuned!


Oh neat! I didn't realize. It's good! I could have been fooled it was done by a whole team :D




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: