Solidity | Reentrancy Attacks Everything You Need To...

Solidity | Reentrancy Attacks Everything You Need To...

EatTheBlocks

3 года назад

54,938 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@dev233
@dev233 - 08.04.2022 06:28

Hi

Ответить
@pedrogorilla483
@pedrogorilla483 - 08.04.2022 07:17

Isn’t this a double spend on steroids?

Ответить
@fonkiti
@fonkiti - 08.04.2022 11:19

Awesome

Ответить
@ParthPatel-fp8lm
@ParthPatel-fp8lm - 08.04.2022 11:35

Very nice content. Keep creating such type of content and past hacks videos.

Ответить
@alleung42
@alleung42 - 08.04.2022 12:25

solidity is so yucky

Ответить
@thetatoken5031
@thetatoken5031 - 08.04.2022 12:39

Wouldn't happen with Theta's tech for rapid calls. Causes trigger for captcha with repeated calls. Just saying.

Ответить
@alimohsen-nq9hp
@alimohsen-nq9hp - 08.04.2022 14:17

Please inquire, I have a huge amount, and I want to decrypt them for usdt (note: they appear to be scam coins), what is required to know to decipher them (of course, it is not a luxury or a hack), I need this money for my future because I am unemployed and I am 40 And the future of my daughter

Ответить
@bossgd100
@bossgd100 - 08.04.2022 14:41

cool

Ответить
@btandayamo
@btandayamo - 08.04.2022 16:24

Would it help adding a require to check if current msg.sender has enough balance to withdraw?

Ответить
@syronbeats3380
@syronbeats3380 - 08.04.2022 17:17

Great channel! Thank you for all the info and helping my journey. I am seeking some advice. I paid for some coding to be done on my contract. Where can I go to have it audited by the community to make sure it’s not malicious, has bugs, and just generally safe. Thank you!

Ответить
@sweet_fentanyl
@sweet_fentanyl - 08.04.2022 18:36

Thanks

Ответить
@tzaopp258
@tzaopp258 - 08.04.2022 19:02

Great explanation! The recursive attack vector is an extremely simple vulnerability to forget about. Some smart contracts look like they are written by someone who has never taken a comp sci course.

Ответить
@priktop8440
@priktop8440 - 09.04.2022 21:52

Thanks Calvin for this great explanation, makes it very clear to understand.

Ответить
@alex-dk2rj
@alex-dk2rj - 12.04.2022 16:40

Thank you for saving me from getting wrecked

Ответить
@Katanotkate
@Katanotkate - 12.04.2022 17:41

Not hearing French accent from your video is kinda strange lol

Ответить
@mota6450
@mota6450 - 13.04.2022 17:40

I subscribed because of Calvin

Ответить
@usamahassan5763
@usamahassan5763 - 14.04.2022 07:03

Is it possible to hit rentrancy attack if user uses transfer function instead of call.send ?

Ответить
@sharpshark626
@sharpshark626 - 14.04.2022 16:44

Like this content. Can we have more contents this which explain a hack that's just happened and how to avoid it. Thanks ETB.

Ответить
@heyoung548
@heyoung548 - 14.04.2022 23:10

Only the owner can call withdraw right now.

Ответить
@Andrej555
@Andrej555 - 17.04.2022 09:11

nice )

Ответить
@WaveFlightSimulations
@WaveFlightSimulations - 19.04.2022 03:48

Check Effects Interact pattern

Ответить
@timwong3597
@timwong3597 - 19.04.2022 19:26

Wow! I guess after watching bunch of gangster videos and my love for web 3 now. That the algorithm helped find what I been looking for. More in depth information of what the hackers have been doing. So I can prevent myself from making mistake or protecting myself. I wish to develop something that doesn’t rugpull anyone but carefully plan their projects. Do you have anymore of these from hackers. Just so I can study and structure my project to have no loopholes

Ответить
@chrisknight1263
@chrisknight1263 - 20.04.2022 11:21

Awesome post thank you ✨😎🤙🏽✨

Ответить
@rayoseldev819
@rayoseldev819 - 23.04.2022 21:23

this contract.. the LOCKED is global por all contract. then 2 person CAN'T use withdraw aren't? because the first persona active locked and the 2n can't access..
Is it true?

Ответить
@baptiste6436
@baptiste6436 - 23.04.2022 22:19

very clear video, but what if the send function fails then the balance will be set to 0 right? Or is the whole thing considered as a transaction and it will be reverted?

Ответить
@ErhanTezcan
@ErhanTezcan - 30.04.2022 22:37

Great video, though I have a question: while using the noReentrancy modifier, I guess we are kind of implementing a mutex flag for the function in question. Since there is only one contract and everyone is calling the same function, this also means that no two people can call it at the same time right? Would this not be an issue, say if I want to withdraw my funds but turns out many people are trying to do that too and we are basically fighting for the spot?

Ответить
@BESTEVERDUDE19
@BESTEVERDUDE19 - 02.05.2022 05:11

I launched a Nft collection in Polygon, what happened to me was that somebody was able to mint my apes for free. How this can happen?

Ответить
@av1shekps
@av1shekps - 03.05.2022 06:52

Can anyone explain why fallback function will be called recursively here?

Ответить
@painandsuffer
@painandsuffer - 03.05.2022 15:24

Cash Rules Everything Around Me

Ответить
@shaw7598
@shaw7598 - 05.05.2022 17:49

It’s funny solidity function calls are not even atomic. This protection should be built in like safe math

Ответить
@alextaboadaa
@alextaboadaa - 27.07.2022 18:44

Hey, i am new in this world, great video! I learn a lot with this channel, but in this case i get lost in the fallback function, why the Bank contract calls fallback()?

Ответить
@RobertGenito
@RobertGenito - 05.08.2022 18:23

What a great concept of a channel!

Ответить
@TheLuchocorrentino
@TheLuchocorrentino - 27.08.2022 16:10

Gran explicación. Todo muy claro. Congrats!

Ответить
@tobiasperez6920
@tobiasperez6920 - 23.09.2022 01:49

Used to work with a Calvin, but he wasn't half as cool as you. Keep it up mate!

Ответить
@cedricloneux1039
@cedricloneux1039 - 14.11.2022 11:35

do you know any repo that povide snippets of code (POC) for each kind of attack like you just did for reentrency?

Ответить
@cedricloneux1039
@cedricloneux1039 - 14.11.2022 11:41

Why does the original contract does not update is mappig the first time ? You say it never reach last line of code updating it. But evil contacts is making multiple calls. Calls that are differents and havee no realtion between each other, so one call can't stop previous one. That's just a new one.
Correct me if I am wrong

Ответить
@Joel-rf7bf
@Joel-rf7bf - 28.12.2022 12:51

Greate video, one question though, how is the thief getting access to the other accounts to drain the cash from the bank if he can only withdraw 1 unit through recusive calls?

Ответить
@90nomads
@90nomads - 29.01.2023 08:48

Agoric is bringing Java Script to web3 to solve this problem

Ответить
@l.a.xbeast8502
@l.a.xbeast8502 - 31.01.2023 16:40

Excellent explanation. Do you think there would be a way to quantify/approximate the risk of attacks like these on any given blockchain? Thanks

Ответить
@mayankchauhan6680
@mayankchauhan6680 - 05.04.2023 17:29

Hey a small question!, when state variable locked = true, will it just stop incoming "withdraw" request from Smart Contract B or will it stop all "withdraw" requests coming from any user?

Ответить
@jopadjr
@jopadjr - 23.06.2023 15:43

1.6k+...Thanks

Ответить
@cecilechau7932
@cecilechau7932 - 02.08.2023 16:28

timely content relevant to # Curve Finance exploit. can I share it ?

Ответить
@bordercut1
@bordercut1 - 07.09.2023 16:57

Great explanation. Thanks for this.

Ответить
@Rudra0x01
@Rudra0x01 - 13.05.2024 01:05

That’s crystal clear and straightforward

Ответить
@Atloos4000
@Atloos4000 - 20.11.2024 00:55

Love it!

Ответить
@uxridge
@uxridge - 22.02.2025 14:28

Good stuff. Thank you.

Ответить