Unchecked CALL Return Values The Vulnerability Preventative Techniques Real-World Example: Etherpot and King of the Ether Unchecked CALL Return Values There are a number of ...
Comparison to Solidity Modifiers Class Inheritance Inline Assembly Function Overloading Variable Typecasting Preconditions and Postconditions Comparison to Solidity One o...
Gas Considerations Avoid Dynamically Sized Arrays Avoid Calls to Other Contracts Estimating Gas Cost Gas Considerations Gas, described in more detail in [gas] , is an incred...
Oracle Use Cases and Examples Oracle Use Cases and Examples Oracles, ideally, provide a trustless (or at least near-trustless) way of getting extrinsic (i.e., “real-world” or o...
Data Authentication Data Authentication If we assume that the source of data being queried by a DApp is both authoritative and trustworthy (a not insignificant assumption), an ...