Eocene | SecurityERC20 Protocol Security Best Practices GuideThe ERC20 standard is one of the most widely used token standards on the blockchain. When deploying ERC20 token projects, apart from…7 min read·Jul 13, 2023----
Eocene | SecurityGeneral Security Coding Guide for Solidity## I. Variable Storage/Assignment/Deletion::13 min read·May 24, 2023----
Eocene | SecuritySolidity compiler medium-high risk vulnerability: Anhead overflow in ABIv2-Reencoding## Overview6 min read·May 12, 2023----
Eocene | SecurityIntroduction and Case Analysis of Read-Only Reentrancy VulnerabilitiesOverview9 min read·May 9, 2023----
Eocene | SecuritySolidity compiler medium-high risk vulnerability:Analysis of storage Write removal on conditional…## Overview6 min read·May 6, 2023----
Eocene | SecurityArbitrage in DeFiDecentralized finance (often stylized as DeFi) is a form of finance built on blockchain technology. It does not rely on traditional…9 min read·Apr 19, 2023----
Eocene | SecurityWhy Tokens with Deflation Mechanism Are Often AttackedOverview6 min read·Mar 7, 2023----