paint-brush
5 Solidity Code Smells Every Dev Should Knowby@sjkelleyjr
2,572 reads
2,572 reads

5 Solidity Code Smells Every Dev Should Know

by Jackson5mOctober 18th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

There are 5 classes of Solidity code smells. If you can detect these code smells, you're more than halfway to finding an exploit to hack the smart contract. They are dynamic arrays, ratio mathematics, balance changes with external calls, looking outside the smart contract, and using tokens for accounting.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - 5 Solidity Code Smells Every Dev Should Know
Jackson HackerNoon profile picture
Jackson

Jackson

@sjkelleyjr

crypto @ robinhood | ex-amazon | yAcademy resident | whitehat @ Oak Security & Spearbit | built & sold a tech-newsletter

About @sjkelleyjr
LEARN MORE ABOUT @SJKELLEYJR'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jackson HackerNoon profile picture
Jackson@sjkelleyjr
crypto @ robinhood | ex-amazon | yAcademy resident | whitehat @ Oak Security & Spearbit | built & sold a tech-newsletter

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Substack
Buzzsumo
Nitter
Allella
Moomoo
Koyu
Leftic