Understanding ERC-4337 User Operation Packing Vulnerability
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 5 minutes The world of Web3 is a world of protocols and standards. You sure must have come across several ERC standards. Some of the most famous ERC standards are 20 and 721, which are for tokens and NFT, respectively. But Web3 is not limited to that. We see regular updates and upgrades in Web3. One of the latest upgrades was ERC 4337, deployed on Ethereum Mainnet in March 2023. Not every update is successful in one go; the same is true with ERC 4337. In this blog, we will learn about vulnerabilities regarding the User Operation section of the standard and their impact. Firstly let ..read more
Visit website
How to Prepare for a Web3 Security Breach: Incident Response Planning
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 5 minutes No matter how hard you try to secure your house from a security breach, you never know what the thief is packing. No matter how secure your locking system is, you never know the skillset of the stealer. In simple words, no lock in the world can’t be picked. What if I tell you there is no way you can be 100% sure your protocol won’t be compromised? This world is a game of possibilities and probabilities. No matter how secure you think you might be, there is always that one possibility you might or might not know about, which can be very devastating. This does not mean that ..read more
Visit website
The Advantages of Continuous Monitoring for Web3 Security
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 4 minutes Imagine you put your funds in a protocol expecting a good return, but 1–2 months down the line, you find out that the funds are lost due to a security breach just because the protocol did not keep up with the attack vectors or was inefficient in monitoring the attack, where would that leave you? To save yourself from such unfortunate circumstances, we advise you to always put only work with the protocols which take security very seriously, and in that matter, security is not a one-time investment. It involves continuous advancement and development based on the ever-evolvin ..read more
Visit website
Why Multi-Party Computation (MPC) is Critical for Web3 Security?
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 6 minutes Web3 being one of the latest technology advancements to take the internet by storm, Web3 is very vibrant in terms of research and new innovations in the field of decentralised systems and distributed networks. Multi-Party Computation exemplifies how versatile the blockchain can be in incorporating new advancements. In this blog, we will discuss what Multi-Party Computation is, what use case it is finding in the blockchain industry, and how it is making Web3 more secure and safe. Let’s start by understanding what Multi-Party Computation is. What is Multi-Party Computation ..read more
Visit website
Part 2: Bridging the Blockchain: Creating a Secure Blockchain Bridge
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 5 minutes Explore what part of the bridge needs security and how to implement that. 2022 was the year of bridge hacks, with 5 major hacks: Qubit, Wormhole, Ronin, Harmony and Nomad. Each protocol faced heavy losses in millions. The bridges ease the inter-chain transaction, but what is the use if we can’t keep them safe? In this blog, we bring you different aspects of that blog and what to be aware of while building or auditing one to avoid such major hacks on bridges and create a better and more secure Web3 ecosystem. Dissecting the bridge from a security point of view There are dif ..read more
Visit website
Top 5 Common errors in Solidity programming Language
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 7 minutes What is common between Parrot, Platypus, and Kangaroo? Well, in case you don’t know, it’s ‘Homoio-thermy’. It’s a process to maintain their internal body temperature through metabolic processes just like auditing is the process to maintain the safety and security of smart contracts.  But in the near past, we have witnessed various events that put a question mark on the security of smart contracts. We were subjected to vulnerabilities which resulted in huge financial loss as compensation. Though with time, the security of the Smart contracts has improved. But we should ..read more
Visit website
Beyond the Hype: ChatGPT and Smart Contract Auditing
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 5 minutes Exploring the effectiveness of chatGPT in Smart Contract Auditing It was 30th November, 2022, when ChatGPT was launched. It did not take it long to take the world by storm. No matter what social media you use, there are posts, memes, informative articles and whatnot on chatGPT. Not only that, the chatGPT was the talk of the mainstream media. There are no second thoughts when I say everyone talked about chatGPT and its power. In this blog, let’s discuss how chatGPT is used or can be used in smart contract auditing or Web3 cyber security. Let’s first start with what chatGPT ..read more
Visit website
Navigating the Layers of Blockchain: Layer 1 vs Layer 2 Explained
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 6 minutes Exploring Layer 1 and Layer 2 and their use case scenarios. “Layer 1” and “Layer 2” you sure would have heard these words before if you know a bit about crypto space. But what is it exactly?, How it helps the whole Web3?, What is their significance? Why is it important in today’s scenario?, These are the questions we will cover and a bit more. So get your favourite beverage. This is going to be one informative blog. Enjoy. What is blockchain? Let’s start with this question, what is blockchain? Well, blockchain is just a technology which enables the transparent distribution ..read more
Visit website
Web 3.0 Security for Enterprise: Approaches and Solutions (Part-2)
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 4 minutes Exploring the security aspect of web3 for enterprises. Web 3.0 – A Security Advantage With so many advantages, we are sure that Web 3.0 is going to be the most worked-upon technology in the near future, and one of the main reasons for that is the security we are provided with the flexibility of Web 3.0. You cannot give an axe to a child. Similarly, you can only create in Web 3.0 with skilled developers. Regarding the security aspect of your business, you need experts like QuillAudits to help you get the most out of security. Now, let’s explore some approaches and solutions ..read more
Visit website
Guidelines for Auditing Staking Protocols
Quillhash Blog
by QuillAudits Team
1y ago
Read Time: 6 minutes In this blog, we have outlined the concept of liquidity staking protocols and auditing guidelines for staking protocols. The guidelines cover a range of vulnerable spots such as withdrawal mechanisms, rounding errors, external calls, fee logic, loops, structs, staking duration, etc. This blog post will be a useful reference for auditing staking protocols and can help you identify potential bugs. What is Liquidity Staking? Liquidity staking allows users to stake their cryptocurrency holdings and earn rewards without sacrificing liquidity. Instead of locking up their coins f ..read more
Visit website

Follow Quillhash Blog on FeedSpot

Continue with Google
Continue with Apple
OR