Eocene | SecurityERC20 Protocol Security Best Practices GuideThe ERC20 standard is one of the most widely used token standards on the blockchain. When deploying ERC20 token projects, apart from…Jul 13, 2023Jul 13, 2023
Eocene | SecurityGeneral Security Coding Guide for Solidity## I. Variable Storage/Assignment/Deletion::May 24, 2023May 24, 2023
Eocene | SecuritySolidity compiler medium-high risk vulnerability: Anhead overflow in ABIv2-Reencoding## OverviewMay 12, 2023May 12, 2023
Eocene | SecurityIntroduction and Case Analysis of Read-Only Reentrancy VulnerabilitiesOverviewMay 9, 2023May 9, 2023
Eocene | SecuritySolidity compiler medium-high risk vulnerability:Analysis of storage Write removal on conditional…## OverviewMay 6, 2023May 6, 2023
Eocene | SecurityArbitrage in DeFiDecentralized finance (often stylized as DeFi) is a form of finance built on blockchain technology. It does not rely on traditional…Apr 19, 2023Apr 19, 2023
Eocene | SecurityWhy Tokens with Deflation Mechanism Are Often AttackedOverviewMar 7, 2023Mar 7, 2023