SECURITY SERIES
Deep dives into specific vulnerability patterns, attack vectors, and security concepts.
EIP-1014 Vulnerability Patterns
Deep dive into EIP-1014 CREATE2 address collision issues and attack vectors.
EIP-1108 Vulnerability Patterns
Deep dive into EIP-1108 precompile gas cost assumptions and cross-chain compatibility issues.
EIP-1559 Vulnerability Patterns
Deep dive into EIP-1559 base fee mechanism implementation vulnerabilities in L2 chains.
EIP-196 Vulnerability Patterns
Deep dive into EIP-196 precompile input validation issues and attack vectors.
EIP-2771 Vulnerability Patterns
Deep dive into EIP-2771 meta-transaction vulnerabilities including nonce handling and replay attack prevention.
EIP-4399 PREVRANDAO Vulnerability Patterns
Deep dive into EIP-4399 PREVRANDAO opcode vulnerabilities in PoS Ethereum, including randomness manipulation by block proposers.
EIP-150 Vulnerability Patterns
Deep dive into EIP-150 63/64 gas forwarding vulnerabilities and attack vectors.
EIP-712 Vulnerability Patterns
Deep dive into EIP-712 signature verification issues and attack vectors.
EIP-7702 Vulnerability Patterns
Deep dive into EIP-7702 account abstraction vulnerabilities and attack vectors.
ERC-7484 Vulnerability Patterns
Deep dive into ERC-7484 Registry Adapter vulnerabilities in modular smart accounts.
ERC-7579 Vulnerability Patterns
Deep dive into ERC-7579 Modular Smart Account vulnerabilities with real audit cases.
Precompile Preimage Pre-population Vulnerability
Deep dive into precompile address pre-population attacks in L2 fraud proof systems like Optimism Cannon.
Transfer 2300 Gas Stipend Vulnerability
Deep dive into the 2300 gas stipend limitation in Solidity's transfer() and send() methods and why they fail on L2 chains.
EIP-2981 Royalty Vulnerability Patterns
Deep dive into EIP-2981 NFT royalty standard vulnerabilities including misattribution, state desynchronization, and stale configuration.
EIP-4844 Blob Transaction Vulnerability Patterns
Deep dive into EIP-4844 blob transaction vulnerabilities in Ethereum rollups, including fee calculation errors, chain halt risks, and data availability issues.
EIP-6780 Vulnerability Patterns
Deep dive into EIP-6780 SELFDESTRUCT behavior change vulnerabilities and attack vectors.
InfiniteSec