Summary
In this chapter, we covered best practices such as avoiding floating pragma, the commit-reveal scheme, using external function calls, and integer rounding errors. Additionally, we discussed attack patterns such as front-running, reentrancy, signature replay attacks, and integer overflow and underflow attacks. These are the most important things to know, as writing contracts in Solidity can be easy, but writing a bulletproof contract is hard.
There have been many hacks, and we have covered some of the most well-known ones, but it's the developer's responsibility to keep checking for newly identified attack patterns, so that they do not make the same mistakes again while writing contracts. Apart from that, always use the latest versions ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Read now
Unlock full access