Комментарии:
Hi
ОтветитьIsn’t this a double spend on steroids?
ОтветитьAwesome
ОтветитьVery nice content. Keep creating such type of content and past hacks videos.
Ответитьsolidity is so yucky
ОтветитьWouldn't happen with Theta's tech for rapid calls. Causes trigger for captcha with repeated calls. Just saying.
ОтветитьPlease inquire, I have a huge amount, and I want to decrypt them for usdt (note: they appear to be scam coins), what is required to know to decipher them (of course, it is not a luxury or a hack), I need this money for my future because I am unemployed and I am 40 And the future of my daughter
Ответитьcool
ОтветитьWould it help adding a require to check if current msg.sender has enough balance to withdraw?
ОтветитьGreat channel! Thank you for all the info and helping my journey. I am seeking some advice. I paid for some coding to be done on my contract. Where can I go to have it audited by the community to make sure it’s not malicious, has bugs, and just generally safe. Thank you!
ОтветитьThanks
ОтветитьGreat explanation! The recursive attack vector is an extremely simple vulnerability to forget about. Some smart contracts look like they are written by someone who has never taken a comp sci course.
ОтветитьThanks Calvin for this great explanation, makes it very clear to understand.
ОтветитьThank you for saving me from getting wrecked
ОтветитьNot hearing French accent from your video is kinda strange lol
ОтветитьI subscribed because of Calvin
ОтветитьIs it possible to hit rentrancy attack if user uses transfer function instead of call.send ?
ОтветитьLike this content. Can we have more contents this which explain a hack that's just happened and how to avoid it. Thanks ETB.
ОтветитьOnly the owner can call withdraw right now.
Ответитьnice )
ОтветитьCheck Effects Interact pattern
ОтветитьWow! I guess after watching bunch of gangster videos and my love for web 3 now. That the algorithm helped find what I been looking for. More in depth information of what the hackers have been doing. So I can prevent myself from making mistake or protecting myself. I wish to develop something that doesn’t rugpull anyone but carefully plan their projects. Do you have anymore of these from hackers. Just so I can study and structure my project to have no loopholes
ОтветитьAwesome post thank you ✨😎🤙🏽✨
Ответитьthis contract.. the LOCKED is global por all contract. then 2 person CAN'T use withdraw aren't? because the first persona active locked and the 2n can't access..
Is it true?
very clear video, but what if the send function fails then the balance will be set to 0 right? Or is the whole thing considered as a transaction and it will be reverted?
ОтветитьGreat video, though I have a question: while using the noReentrancy modifier, I guess we are kind of implementing a mutex flag for the function in question. Since there is only one contract and everyone is calling the same function, this also means that no two people can call it at the same time right? Would this not be an issue, say if I want to withdraw my funds but turns out many people are trying to do that too and we are basically fighting for the spot?
ОтветитьI launched a Nft collection in Polygon, what happened to me was that somebody was able to mint my apes for free. How this can happen?
ОтветитьCan anyone explain why fallback function will be called recursively here?
ОтветитьCash Rules Everything Around Me
ОтветитьIt’s funny solidity function calls are not even atomic. This protection should be built in like safe math
ОтветитьHey, i am new in this world, great video! I learn a lot with this channel, but in this case i get lost in the fallback function, why the Bank contract calls fallback()?
ОтветитьWhat a great concept of a channel!
ОтветитьGran explicación. Todo muy claro. Congrats!
ОтветитьUsed to work with a Calvin, but he wasn't half as cool as you. Keep it up mate!
Ответитьdo you know any repo that povide snippets of code (POC) for each kind of attack like you just did for reentrency?
ОтветитьWhy does the original contract does not update is mappig the first time ? You say it never reach last line of code updating it. But evil contacts is making multiple calls. Calls that are differents and havee no realtion between each other, so one call can't stop previous one. That's just a new one.
Correct me if I am wrong
Greate video, one question though, how is the thief getting access to the other accounts to drain the cash from the bank if he can only withdraw 1 unit through recusive calls?
ОтветитьAgoric is bringing Java Script to web3 to solve this problem
ОтветитьExcellent explanation. Do you think there would be a way to quantify/approximate the risk of attacks like these on any given blockchain? Thanks
ОтветитьHey a small question!, when state variable locked = true, will it just stop incoming "withdraw" request from Smart Contract B or will it stop all "withdraw" requests coming from any user?
Ответить1.6k+...Thanks
Ответитьtimely content relevant to # Curve Finance exploit. can I share it ?
ОтветитьGreat explanation. Thanks for this.
ОтветитьThat’s crystal clear and straightforward
ОтветитьLove it!
ОтветитьGood stuff. Thank you.
Ответить