bytescanBytescan’s Approach for the Security Audit of Crypto WalletsMany cryptocurrency owners store their currency as a key with passwords in crypto wallets, often on a mobile devices, web browsers, or…Jan 4, 2023Jan 4, 2023
bytescanNull Pointer Challenge in GolangNil pointer deference is a trickly error that can lead to memory access violations once a nil pointer or nil interface was passed to a…Apr 19, 2022Apr 19, 2022
bytescanHow to Optimize Solidity Smart Contracts Effectively!In this short article, we explain to you some tricks that we suggest to our clients at ByteScan.net to reduce gas consumption in their…Apr 15, 2022Apr 15, 2022
bytescanDetecting Re-Entrancy Attack in Smart ContractsOn 30 April 2016, the DAO was launched on Ethereum Block 1428757. It was an thrilling concept: a decentralized autonomous organization…Apr 15, 2022Apr 15, 2022
bytescan3 Most Common Vulnerabilities in Solana Smart ContractsHey everyone! We’re ByteScan.net, a team of security researchers who have spent the past ~24 months inspecting the internals of the Solana…Apr 5, 2022Apr 5, 2022