Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]by@Valid.Network
1,278 reads

Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]

May 7th 2020
5 min
by @Valid.Network 1,278 reads
tldt arrow
Read on Terminal Reader🖨️

Too Long; Didn't Read

Smart contracts offer the ability to determine factors and expectations set out by the contract. In the field of programming, factors can be described as ‘variables’ and ‘conditions’ within the actual code. As such, state changes throughout a smart contract should adhere only to the contract’s logic. We will examine a couple of cases that prove a capable attacker could potentially violate the terms set by the smart contract in the first place. This can be achieved by these three methods: arithmetic overflows/underflows of EVM.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Maliciously Manipulate Storage Variables in Solidity [A How-To Guide]
Valid Network Research HackerNoon profile picture

@Valid.Network

Valid Network Research

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa