jaeswift-website/api/data/awesomelist/kareniel--awesome-evm-security.json

1 line
No EOL
14 KiB
JSON

{"slug": "kareniel--awesome-evm-security", "title": "Awesome Evm Security", "description": "🕶 A high-level overview of the EVM security ecosystem", "github_url": "https://github.com/kareniel/awesome-evm-security", "stars": "77", "tag": "Security", "entry_count": 78, "subcategory_count": 2, "subcategories": [{"name": "General", "parent": "", "entries": [{"name": "Guides", "url": "#guides", "description": ""}, {"name": "Governance", "url": "#governance", "description": ""}, {"name": "Architecture", "url": "#architecture", "description": ""}, {"name": "Standards", "url": "#standards", "description": ""}, {"name": "System Assets", "url": "#system-assets", "description": ""}, {"name": "Threats", "url": "#threats", "description": ""}, {"name": "Vulnerabilities", "url": "#vulnerabilities", "description": ""}, {"name": "Controls", "url": "#controls", "description": ""}, {"name": "Ecosystem", "url": "#ecosystem", "description": ""}, {"name": "CryptoSec.info", "url": "https://cryptosec.info/", "description": "Information to help beginners learn how to protect their funds against hackers and scammers."}, {"name": "Simplified Roadmap for Blockchain Security", "url": "https://devansh.xyz/blockchain-security/2021/09/17/genesis-0x01.html", "description": "Covers all rudimentary topics that one needs to know in order to get into the field of Blockchain Security."}, {"name": "How to become a smart contract auditor", "url": "https://cmichel.io/how-to-become-a-smart-contract-auditor/", "description": "Frequently asked questions that are related to auditing and auditors can get their first job."}, {"name": "A beginner's guide to DAOs", "url": "https://linda.mirror.xyz/Vh8K4leCGEO06_qSGx-vS5lvgUqhqkCz9ut81WwCP2o", "description": "Gives a high level overview of what DAOs are, why they are interesting and some of their use cases."}, {"name": "Deep DAO", "url": "https://deepdao.io/#/deepdao/dashboard", "description": "Lists, ranks and analyzes top DAOs across multiple metrics."}, {"name": "SAFT Agreements", "url": "https://saftproject.com/", "description": "A commercial instrument used to convey rights in tokens prior to the development of the tokens' functionality."}, {"name": "Voting Options in DAOs", "url": "https://medium.com/daostack/voting-options-in-daos-b86e5c69a3e3", "description": "Voting Options in DAOs."}, {"name": "The Wyoming DAO bill", "url": "https://twitter.com/awrigh01/status/1369328856260354051", "description": "A thread about Wyoming DAOs ."}, {"name": "It Takes a Cryptonetwork", "url": "https://medium.com/primedao/it-takes-a-cryptonetwork-2ae9ab541c17", "description": "Prime's Strategy for DAO to DAO Relations."}, {"name": "DAOs, Democracy and Governance", "url": "https://merkle.com/papers/DAOdemocracyDraft.pdf", "description": "A paper by Ralph Merkle about DAOs."}, {"name": "Shelling Out: The Origins of Money", "url": "https://nakamotoinstitute.org/shelling-out/", "description": "Illustrates the value of collectibles in reducing social transaction costs."}, {"name": "Foundations of Cryptoeconomic Systems", "url": "https://epub.wu.ac.at/7309/8/Foundations%20of%20Cryptoeconomic%20Systems.pdf", "description": "This paper explores why the term"}, {"name": "Towards a Practice of Token Engineering", "url": "https://blog.oceanprotocol.com/towards-a-practice-of-token-engineering-b02feeeff7ca", "description": "How do we design tokenized ecosystems, their incentives and how do we analyze or verify them?"}, {"name": "A Crash Course in Mechanism Design for Cryptoeconomic Applications", "url": "https://medium.com/blockchannel/a-crash-course-in-mechanism-design-for-cryptoeconomic-applications-a9f06ab6a976", "description": "Introduces the basic concepts of mechanism design, and gives a taste for their usefulness in the cryptocurrency world."}, {"name": "WTF Is QF", "url": "https://wtfisqf.com/?grant=\\&grant=\\&grant=\\&grant=\\&match=1000", "description": "A simple explanation of quadratic funding."}, {"name": "Bonding Curves Explained", "url": "https://yos.io/2018/11/10/bonding-curves", "description": "What bonding curves are and their potential applications."}, {"name": "DeFi Safety", "url": "https://www.defisafety.com/", "description": "Best practices security score reviews."}, {"name": "DASP Top 10 of 2018", "url": "https://dasp.co/", "description": "Decentralized Application Security Project Top 10 vulnerabilities."}, {"name": "IVSCS", "url": "https://immunefi.com/severity-updated/", "description": "Immunefi Vulnerability Severity Classification System."}, {"name": "Smart Contract Security Verification Standard", "url": "https://securing.github.io/SCSVS/", "description": "A free 14-part checklist created to standardize the security of smart contracts for developers, architects, security reviewers and vendors."}, {"name": "Secureth guidelines", "url": "https://guidelines.secureth.org/", "description": "Aid you in formulating your own software engineering process by giving a complete picture of all the different concerns and expectations in your software projects."}, {"name": "CryptoCurrency Security Standard (CCSS)", "url": "https://cryptoconsortium.github.io/CCSS/", "description": "A set of requirements for all information systems that make use of cryptocurrencies, including exchanges, web applications, and cryptocurrency storage solutions."}, {"name": "The Solcurity Standard", "url": "https://github.com/Rari-Capital/solcurity", "description": "Opinionated security and code quality standard for Solidity smart contracts.", "stars": "972"}, {"name": "Security Considerations in the Solidity documentation", "url": "https://docs.soliditylang.org/en/v0.8.6/security-considerations.html", "description": "Lists some pitfalls and general security recommendations."}, {"name": "Ethereum 2.0 Specifications Security Audit Report", "url": "https://leastauthority.com/static/publications/LeastAuthority-Ethereum-2.0-Specifications-Audit-Report.pdf", "description": "Security Audit Report of the Eth2.0 spec by Least Authority."}, {"name": "Getting Deep Into EVM", "url": "https://hackernoon.com/getting-deep-into-evm-how-ethereum-works-backstage-ac7efa1f0015", "description": "An Ultimate, In-depth Explanation of How EVM Works."}, {"name": "Ethereum EVM illustrated", "url": "https://takenobu-hs.github.io/downloads/ethereum_evm_illustrated.pdf", "description": "Exploring some mental models and implementations."}, {"name": "Ethereum Blockspace: Who Gets What and Why", "url": "https://www.aniccaresearch.tech/blog/ethereum-blockspace-who-gets-what-and-why", "description": "Ethereum blockspace market structure."}, {"name": "What Is Uniswap and How Does It Work?", "url": "https://academy.binance.com/en/articles/what-is-uniswap-and-how-does-it-work", "description": "What Uniswap is, how it works, and how you can swap tokens on it simply with an Ethereum wallet."}, {"name": "Scaling EVM (Ethereum Virtual Machine)", "url": "https://capitalgram.com/posts/scaling-evm/", "description": "How fast and far can the EVM based blockchain architecture still take us."}, {"name": "L2Beat", "url": "https://l2beat.com/", "description": "Transparent and verifiable insights into emerging layer two (L2) technologies."}, {"name": "The Non-Fungible Token Bible", "url": "https://opensea.io/blog/guides/non-fungible-tokens", "description": "Everything you need to know about NFTs."}, {"name": "KEVM", "url": "https://github.com/kframework/evm-semantics", "description": "A formal model of the EVM in the K framework.", "stars": "377"}, {"name": "Blockchain Graveyard", "url": "https://magoo.github.io/Blockchain-Graveyard/", "description": "A list of all massive security breaches or thefts involving blockchains."}, {"name": "List of Bitcoin Heists", "url": "https://bitcointalk.org/index.php?topic=576337", "description": "Research on prior Bitcoin-related thefts."}, {"name": "Blockchain Threat Intelligence", "url": "https://www.blockthreat.io/", "description": "The latest in blockchain, DeFi and cryptocurrency threat intelligence, vulnerabilities, security tools, and events."}, {"name": "Rekt News", "url": "https://rekt.news/", "description": "Investigative journalism, creative commentary, and incident analysis."}, {"name": "DeFiYield's REKT db", "url": "https://defiyield.app/rekt-database", "description": "Database of Crypto Hacks, Exploit, Scam."}, {"name": "CryptoScamDB", "url": "https://cryptoscamdb.org/scams", "description": "Keeping track of cryptocurrency scams in an open-source database."}, {"name": "Mudit Gupta's Twitter threads", "url": "https://mudit.blog/twitter-threads/", "description": "Early analysis and educational content on Twitter."}, {"name": "Flash Boys 2.0 Paper", "url": "https://ieeexplore.ieee.org/document/9152675", "description": "Frontrunning in Decentralized Exchanges, Miner Extractable Value, and Consensus Instability."}, {"name": "MEV-explore", "url": "https://explore.flashbots.net/", "description": "Help the community understand and quantify the significance of \"Dark Forest activities\" and their impact on the Ethereum network."}, {"name": "Flashloan monitor", "url": "https://monitor.blocksecteam.com/", "description": "Dashboard that helps you monitor flashloan transactions."}, {"name": "Known Attacks", "url": "https://consensys.github.io/smart-contract-best-practices/known_attacks/", "description": "A list of known attacks which you should be aware of, from Consensys."}, {"name": "Solidity Security", "url": "https://blog.sigmaprime.io/solidity-security.html", "description": "Comprehensive list of known attack vectors and common anti-patterns."}, {"name": "SWC Registry", "url": "https://swcregistry.io/", "description": "Smart Contract Weakness Classification and Test Cases."}, {"name": "246 Findings", "url": "https://blog.trailofbits.com/2019/08/08/246-findings-from-our-smart-contract-audits-an-executive-summary/", "description": "246 Findings From Trail of Bits Smart Contract Audits."}, {"name": "A Survey of Security Vulnerabilities in Ethereum Smart Contracts", "url": "https://arxiv.org/pdf/2105.06974.pdf", "description": "Explains eight vulnerabilities that are specific to the application level of blockchain technology by analyzing the past exploitation case scenarios of these security vulnerabilities."}, {"name": "List of Security Vulnerabilities", "url": "https://github.com/runtimeverification/verified-smart-contracts/wiki/List-of-Security-Vulnerabilities", "description": "A comprehensive list of common smart contract security vulnerabilities, compiled from various sources.", "stars": "535"}, {"name": "List of Known Bugs", "url": "https://docs.soliditylang.org/en/v0.8.1/bugs.html", "description": "A JSON-formatted list of some of the known security-relevant bugs in the Solidity compiler."}, {"name": "Simple Security Toolkit", "url": "https://github.com/nascentxyz/simple-security-toolkit", "description": "Opinionated recommendations that the team at Nascent find to be appropriate, particularly for teams developing and managing early versions of a protocol.", "stars": "586"}, {"name": "Gnosis Safe", "url": "https://docs.gnosis-safe.io", "description": "Multi-sig. Require multiple team members to confirm every transaction in order to execute it, which helps prevent unauthorized access to company crypto."}, {"name": "List of DeFi auditors", "url": "https://www.defisafety.com/auditors", "description": "List of DeFi auditors maintained by DeFiSafety."}, {"name": "State of DeFi Audits", "url": "https://medium.com/conflux-network/the-overlooked-element-of-defi-adoption-e3b29829e3da", "description": "Article taking a look at the auditing space and its importance in onboarding users by properly securing new DeFi protocols."}, {"name": "Building Secure Contracts", "url": "https://github.com/crytic/building-secure-contracts/", "description": "Trail of Bits' guidelines and best practices on how to write secure smart contracts.", "stars": "1.2k"}, {"name": "Solidity Patterns", "url": "https://fravoll.github.io/solidity-patterns/", "description": "A compilation of patterns and best practices for the smart contract programming language Solidity."}, {"name": "Security Pattern for Ethereum and Solidity", "url": "https://docs.google.com/spreadsheets/d/1PF4QZudW6Z7EV4hqQfwPo3A43AVqPrsuzzzey5yRYcs/edit#gid=0", "description": "Google Sheets Checklists."}, {"name": "Solidity Best Practices for Smart Contract Security", "url": "https://consensys.net/blog/developers/solidity-best-practices-for-smart-contract-security/", "description": "Pro tips from Consensys to ensure your Ethereum smart contracts are fortified."}, {"name": "CERtified", "url": "https://cer.live/", "description": "Top 100 exchanges by Cybersecurity rating."}, {"name": "Smart Contract Security Registry", "url": "https://github.com/ethereum-lists/contracts", "description": "An effort to identify deployed contracts instances given their chain and address, by listing the project they belong to.", "stars": "82"}, {"name": "Forta", "url": "https://docs.forta.network/", "description": "Community-based runtime security network for smart contracts."}, {"name": "People to follow on Twitter", "url": "https://twitter.com/i/lists/1453086258436128770", "description": "Twitter list to an overview of the web3 ecosystem and security people."}, {"name": "Videos to watch on YouTube", "url": "https://www.youtube.com/playlist?list=PLox242_JhiuEe64LzW1M8XpiQ2-N5bZsX", "description": "YouTube playlist of web3 security videos."}]}, {"name": "See Also", "parent": "Ecosystem", "entries": [{"name": "Awesome BlockSec CTF", "url": "https://github.com/0xjeffsec/awesome-blocksec-ctf", "description": "Blockchain security Capture the Flag (CTF) competitions.", "stars": "7"}, {"name": "Awesome Buggy ERC20 Tokens", "url": "https://github.com/sec-bit/awesome-buggy-erc20-tokens", "description": "Vulnerabilities in ERC20 Smart Contracts With Tokens Affected.", "stars": "494"}, {"name": "Awesome Cryptoeconomics", "url": "https://github.com/jpantunes/awesome-cryptoeconomics", "description": "Cryptoeconomic research and learning materials.", "stars": "1.5k"}, {"name": "Awesome Zero-Knowledge Proofs (ZKP)", "url": "https://github.com/matter-labs/awesome-zero-knowledge-proofs", "description": "A curated list of awesome things related to learning Zero-Knowledge Proofs (ZKP).", "stars": "3k"}, {"name": "Officer CIA's Ultimate DeFi Research Base", "url": "https://github.com/OffcierCia/ultimate-defi-research-base", "description": "Curated DeFI & Blockchain research papers and tools.", "stars": "929"}, {"name": "Awesome MEV resources", "url": "https://github.com/0xalpharush/awesome-MEV-resources", "description": "", "stars": "696"}]}]}