Open in app

Sign in

Medium Logo
Write

Sign in

Eocene | Security
Eocene | Security

8 followers

Home

About

ERC20 Protocol Security Best Practices Guide

The ERC20 standard is one of the most widely used token standards on the blockchain. When deploying ERC20 token projects, apart from…

Jul 13, 2023
ERC20 Protocol Security Best Practices Guide
ERC20 Protocol Security Best Practices Guide
Jul 13, 2023

Brief Analysis of New Features in Uniswap V4

Overview

Jul 5, 2023
Brief Analysis of New Features in Uniswap V4
Brief Analysis of New Features in Uniswap V4
Jul 5, 2023

Permit2 Introduction and Risk Analysis

Overview

Jun 6, 2023
Permit2 Introduction and Risk Analysis
Permit2 Introduction and Risk Analysis
Jun 6, 2023

General Security Coding Guide for Solidity

## I. Variable Storage/Assignment/Deletion::

May 24, 2023
May 24, 2023

Solidity compiler medium-high risk vulnerability: Anhead overflow in ABIv2-Reencoding

## Overview

May 12, 2023
Solidity compiler medium-high risk vulnerability: Anhead overflow in ABIv2-Reencoding
Solidity compiler medium-high risk vulnerability: Anhead overflow in ABIv2-Reencoding
May 12, 2023

Introduction and Case Analysis of Read-Only Reentrancy Vulnerabilities

Overview

May 9, 2023
Introduction and Case Analysis of Read-Only Reentrancy Vulnerabilities
Introduction and Case Analysis of Read-Only Reentrancy Vulnerabilities
May 9, 2023

Solidity compiler medium-high risk vulnerability:Analysis of storage Write removal on conditional…

## Overview

May 6, 2023
Solidity compiler medium-high risk vulnerability:Analysis of storage Write removal on conditional…
Solidity compiler medium-high risk vulnerability:Analysis of storage Write removal on conditional…
May 6, 2023

Arbitrage in DeFi

Decentralized finance (often stylized as DeFi) is a form of finance built on blockchain technology. It does not rely on traditional…

Apr 19, 2023
Arbitrage in DeFi
Arbitrage in DeFi
Apr 19, 2023

The Analysis of Yearn Finance Attack

Overview

Apr 14, 2023
The Analysis of Yearn Finance Attack
The Analysis of Yearn Finance Attack
Apr 14, 2023

Why Tokens with Deflation Mechanism Are Often Attacked

Overview

Mar 7, 2023
Why Tokens with Deflation Mechanism Are Often Attacked
Why Tokens with Deflation Mechanism Are Often Attacked
Mar 7, 2023
Eocene | Security

Eocene | Security

8 followers

Smart contract audit, attack analysis, web3 security research, on-chain monitor and alert. Powered by Eceone Research.

Help

Status

About

Careers

Press

Blog

Privacy

Rules

Terms

Text to speech