Difference between revisions of "Smart contract security"

From wikieduonline
Jump to navigation Jump to search
Line 1: Line 1:
  
* In 2017, $150 million worth of ETH was stolen from an organization named Parity technologies due to a critical vulnerability present in their Ethereum smart contract.
+
* In 2017, $150 million worth of ETH was stolen from an organization named [[Parity technologies]] due to a critical vulnerability present in their Ethereum smart contract.
 
* In 2016, a DAO called Genesis DAO was compromised by a hacker(s) exploiting a security loophole in the system. Here, hackers stole $50 million worth of ETH from Genesis DAO’s crowdfunding investors.
 
* In 2016, a DAO called Genesis DAO was compromised by a hacker(s) exploiting a security loophole in the system. Here, hackers stole $50 million worth of ETH from Genesis DAO’s crowdfunding investors.
* In August 2021, one of the biggest cryptocurrency heists happened. Hackers stole $613 million worth of digital currency from a company named Poly Network. They exploited a vulnerability in the digital contracts Poly Network uses.
+
* In August 2021 Hackers stole $613 million worth of digital currency from a company named [[Poly Network]]. They exploited a vulnerability in the digital contracts Poly Network uses.
 
<ref>https://www.getastra.com/blog/security-audit/smart-contract-security/</ref>
 
<ref>https://www.getastra.com/blog/security-audit/smart-contract-security/</ref>
  

Revision as of 19:05, 30 May 2022

  • In 2017, $150 million worth of ETH was stolen from an organization named Parity technologies due to a critical vulnerability present in their Ethereum smart contract.
  • In 2016, a DAO called Genesis DAO was compromised by a hacker(s) exploiting a security loophole in the system. Here, hackers stole $50 million worth of ETH from Genesis DAO’s crowdfunding investors.
  • In August 2021 Hackers stole $613 million worth of digital currency from a company named Poly Network. They exploited a vulnerability in the digital contracts Poly Network uses.

[1]

Related

See also

  • https://www.getastra.com/blog/security-audit/smart-contract-security/
  • Advertising: