-
# QA (LOW & NON-CRITICAL)
## [L-01] Use of floating pragma
Floating Pragma used in `AccessControlMechanism.sol`. Contracts should be deployed with the same compiler version and flags that they have…
-
```
-----BEGIN BITCOIN SIGNED MESSAGE-----
================================================================================
h4x.tide.org writeup
===================================================…
-
### Context
The users of Web Applications expect them to be a more secure and controlled environment than a regular website, which can do any kind of wacky network requests, push or force them to upl…
ghost updated
3 years ago
-
## **Hermes Analysis**
### **Approach**
The process of auditing the Hermes protocol started with a review of the tokens implementation and management contracts. This included a review of the ERC…
-
Hello! Given the current scenario of increasing attacks on supply chain projects, Google (in partnership with the [Open Source Security Foundation](https://openssf.org/)) has hired me to work around i…
-
As of today, after 20+ years, I'm considering myself retired.
There are many reasons why:
* It's not that good anyway and has lousy reviews
* I'm not a real programmer and will never be good at i…
-
Dear developers of Moquette,
We are a security research group from HUST China, IU USA, and NKU China. Recently we studied the MQTT service in Moquette of the latest version (https://github.com/moquet…
-
The blocks' nTime field is currently an unsigned 32-bit integer. That will overflow in 2106. Would it be too optimistic to change it to a uint64_t now?
-
### Summary of the new feature / enhancement
As an administrator, I'd like to know whether my fleet is vulnerable to the [terrapin attack](https://terrapin-attack.com/).
### Proposed technical imple…
-
I don't know if this can be possible but another idea.
as an extension would maybe be a first step....