Skip to content

The ultimate, most advanced, security, DeFi, assembly, web3 auditor course ever created.

License

Notifications You must be signed in to change notification settings

Cyfrin/security-and-auditing-full-course-s23

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

82 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Smart Contract Auditing, Assembly, Security, and DeFi Ultimate Course

Level up your career as a smart contract auditor writing secure and optimized smart contracts.

Welcome to the repository for the Ultimate Smart Contract Auditing, Assembly, Security, and DeFi Course by Cyfrin Updraft and The Red Guild!

[IMPORTANT!] Course Link: https://updraft.cyfrin.io/courses/security

This repository houses the written content of our courses, organized to facilitate easy access and contribution from our community. Please refer to this for an in-depth explanation of the content:

  • Website - Join Cyfrin Updraft and enjoy 50+ hours of smart contract development courses
  • Twitter - Stay updated with the latest course releases
  • LinkedIn - Add Updraft to your learning experiences
  • Discord - Join a community of 3000+ developers and auditors
  • Newsletter - Weekly security research tips and resources to level up your career
  • Codehawks - Smart contracts auditing competitions to help securing web3


Smart Contract Security, Auditing, Assembly, and DeFi Ultimate Course


Table of Contents

Note: If you're familiar with Patrick's previous courses, we have renamed "Lessons" to "Sections"

Smart Contract Auditing, Assembly, Security, and DeFi Ultimate Course

Smart Contract Auditing, Assembly, Security, and DeFi Ultimate Course
  1. Smart Contract Auditing, Assembly, Security, and DeFi Ultimate Course
Table of Contents
  1. Table of Contents
Introduction, Resources, and Prerequisites
  1. Resources For This Course
  2. Prerequisites
  3. Outcome
  4. Bonus NFTs
Curriculum
  1. Curriculum
πŸ€— Section 0: Welcome to the Course
  1. Welcome
  2. Why Security?
  3. Why Web3 is so important
  4. The Final Boss Codebase, you'll be able to audit this at the end of this course
  5. Best Practices for this course
  6. Section 0 NFT
🐸 Section 1: Review (Don't skip)
  1. Section 1 NFT
❓ Section 2: What is a smart contract audit (Security Review)?
  1. What is a security review/smart contract audit?
  2. Smart Contract Development Life Cycle
  3. Top Smart Contract Auditors (Subjective!)
  4. Tooling
  5. Audit Readiness
  6. Attacker vs. Defender mindset
  7. Top Attack Vectors
  8. Section 2 NFT
⛳️ Section 3: Your first audit | PasswordStore Audit
  1. Security Review > Audit
  2. "The Tincho"
  3. Exploits
  4. Exploits: Access Controls
  5. Writing your first finding
  6. Exploits: Private Data
  7. Your first report
  8. Section 3 NFT
🐢 Section 4: Manual & Static Analysis | Puppy Raffle Audit
  1. Tooling: Static Analysis
  2. Scoping & Reconnaissance: Puppy Raffle
  3. Exploits: Reentrancy
  4. Exploits: Weak RNG
  5. Exploits: Arithmetic issues
  6. Exploits: DoS (Denial of service)
  7. Exploits: Poor ETH Handling
  8. Informational Findings
  9. Gas Audits
  10. Code Maturity
  11. Writing the report: Puppy Raffle
  12. Section 4 NFT
πŸ”„ Section 5: Invariants & Intro to DeFi | TSwap Audit
  1. Scoping & Reconnaissance: T-Swap
  2. Intro to DeFi/OnChain Finance
  3. Tooling: T-Swap
  4. Exploits: Weird ERC20s
  5. Exploits: Core Invariant breaking
  6. Design Patterns: T-Swap
  7. Section 5 NFT
🌩️ Section 6: Centralization, Proxies, and Oracles | Thunder Loan Audit
  1. Section 6: Centralization, Proxies, and Oracles | Thunder Loan Audit
  2. Scoping & Reconnaissance: Thunder Loan
  3. Tooling: Thunder Loan
  4. Design Patterns: Thunder Loan
  5. Section 6 NFT
πŸŒ‰ Section 7: Bridges, Chains, Signatures, Intro to Yul/Assembly | Bridge Boss Audit
  1. Section 7: Bridges, Chains, Signatures, Intro to Yul/Assembly | Bridge Boss Audit
  2. Tooling: Boss Bridge
  3. Scoping & Reconnaissance: Boss Bridge
  4. Bridge Hacks
  5. Design Patterns: Boss Bridge
  6. Section 7 NFT
πŸ›‘οΈ Section 8: (THE FINAL BOSS AUDIT) MEV, Nodes, & DAOs | Vault Guardians Audit
  1. Section 8: (THE FINAL BOSS AUDIT) MEV, Nodes, & DAOs | Vault Guardians Audit
  2. Concepts: Vault Guardians
  3. Introduction to MEV
  4. Design Patterns: Vault Guardians
  5. Section 8 NFT
First CodeHawks Competitive Audit
  1. First CodeHawks Competitive Audit
Congratulations
  1. Congratulations
  2. Where do I go now?
  3. Learning More
Thank you
  1. Thank you
  2. Sponsors
  3. Lead Lecturers / Code Builders
  4. Guest Lecturers
  5. Special thanks
  6. More Security Stuff
  7. Huge Extra Thank YOU

Introduction, Resources, and Prerequisites

Head over to the Cyfrin Updraft website to get the best learning experience!

Link to course: https://updraft.cyfrin.io/courses/security

⚠️ All code associated with this course is for demo purposes only. They have been audited, but we do not recommend them for production use and should be used at your own risk.

Resources For This Course

Join Cyfrin Updraft for the best learning experience!

  • AI Frens
  • Github Discussions
    • Ask questions and chat about the course here!
  • Stack Exchange Ethereum
    • Great place for asking technical questions about Ethereum
  • Peeranha
    • Decentralized Stack Exchange!
  • Cookbook
    • A smart contract registry and co-pilot

Exploit Resources

Challenge Contracts Registry

Prerequisites

An intermediate understanding of solidity. You don't need to be a pro, but you should be familiar with:

  • Blockchain basics (transactions, blocks, decentralization, etc)
  • Running a smart contract test suite (hardhat, foundry, truffle, etc)
  • Solidity basics (variables, functions, structs, etc)

Here are some resources to get you up to speed with the prerequisites:

  • Full Foundry Course: This will give you every single prerequisite
  • Speed Run Ethereum: This will give you most of what you need. But you’ll need a little extra time on invariant tests, using foundry, and DeFi/OnChain Finance.

Prerequisite tools

Outcome

  • Have the foundational skills to become a professional smart contract auditor
  • Speak, interact, and contribute to the web3 security community
  • Compete in web3 competitive audits
  • Compete in web3 bug bounties
  • Start a career as an independent auditor
  • Become a top 1% smart contract developer

Bonus NFTs

Important Notes for zkSync

IF YOU DECIDE TO MINT THE REAL NFT:

  1. We didn't audit/security review the NFT, so if you want to make sure you'll be safe, interact with the contract using a burner wallet (a wallet with very little money that you don't use for anything else)
    1. In fact... Get good at interacting with wallets from a burner wallet
  2. Read my Tweet thread on basic wallet safety

Bridging to zkSync

  1. We didn't show you how to bring ETH -> zkSync, but the process would be:
    1. Buy ETH (On an exchange like Coinbase or Kraken)
  2. Send ETH -> one of your wallets like:
    1. Safe (Multi-Sig)
    2. Metamask
    3. Frame
    4. Rainbow
    5. Argent
    6. Coinbase Wallet
  3. Use the zkSync Bridge

Curriculum

πŸ€— Section 0: Welcome to the Course

Do not skip this section!

Welcome

Why Web3 Security?

Why Web3 is so important

  • Rebuild trust in the ecosystem.

  • Wild West image to the outsiders

  • Pick a class

The Final Boss Codebase, you'll be able to audit this at the end of this course

Best Practices for this course

  • Register for Cyfrin Updraft
    • USE THIS SITE!!! It's specifically made to make learning easier
  • Follow the repository: While going through the course be 100% certain to follow along with the github repository. If you run into in an issue check the chronological-updates in the repo.
  • Be Active in the community: Ask questions and engage with other developers going through the course in the discussions tab, be sure to go and say hello or gm! This space is different from the other industries, you don't have to be secretive; communicate, network and learn with others :)
  • Learn at your own pace: It doesn't matter if it takes you a day, a week, a month or even a year. Progress >>> Perfection
  • Take Breaks: You will exhaust your mind and recall less if you go all out and watch the entire course in one sitting. Suggested Strategy every 25 minutes take a 5 min break, and every 2 hours take a longer 30 min break
  • Refer to Documentation: Things are constantly being updated, so whenever Patrick opens up some documentation, open it your end and maybe even have the code sample next to you.
  • Use ChatGPT and/or the course chat

And finally, by embarking on this journey, you are now a "Security Researcher", not an "Auditor". The key word is "Researcher", so we will go over strategies for continued learning so you can stay on top of your game.

🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯

🎯 Exercise: Write yourself a message about why you want this

  • This will be important for when things get hard
  • Is it money? Save web3? Become someone? Write down as many reasons as possible.

Section 0 NFT

🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯🎯

(back to top) ⬆️

🐸 Section 1: Review (Don't skip)

Tooling & Environment Prerequisites

  • VSCode
  • VSCodium
  • Foundry
    • chisel
    • cast
    • forge
  • Windows Users: WSL
  • AI Helpers
    • ChatGPT
    • Phind
  • Forums & Resources
    • Ethereum Stack Exchange
    • Peeranha
    • Github Discussions

Solidity & Smart Contract Prerequisites

  • Remix
  • Basic smart contracts
    • forge init

Fuzzing & Stateful Fuzzing (This might be new)

  • Fuzz tests
  • Stateless Fuzzing
  • Stateful fuzzing
  • Invariants

Common EIPs/ERCs

  • Github Copilot
  • ERC20s
  • NFTs (ERC721s)

Advanced Solidity

  • storage
    • Clip from foundry course
  • Fallback & Receive
  • Encoding, Call, & Staticcall
  • Delegatecall & Proxies
    • Clip from foundry full course
  • tx.origin vs msg.sender
  • Selfdestruct (to be removed in an upcoming fork)

Advanced Foundry

  • mainnet-forking

🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸

🐸 Exercise:

  1. Join the CodeHawks/Cyfrin Discord
  2. Go for a walk, and buckle up

Section 1 NFT

🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸🐸

(back to top) ⬆️

❓ Section 2: What is a smart contract audit (Security Review)?

What is a security review/smart contract audit?

  • High Level Overview
  • People say "audit" -> security review
  • There is no silver bullet to auditing, and they have limitations
  • 3 phases of a security review
    • Initial Review
        1. Scoping
        1. Reconnaissance
        1. Vulnerability identification
        1. Reporting
    • Protocol fixes
        1. Fixes issues
        1. Retests and adds tests
    • Mitigation Review
        1. Reconnaissance
        1. Vulnerability identification
        1. Reporting
  • Plan & Design
  • Develop & Test
  • Smart Contract Audit & Post Deploy Planning
  • Deploy
  • Monitor & Maintain
  • Use this list to reference how top quality security teams do reviews, post reports, do research, etc

Audit Readiness

Tooling

  • Static Analysis
    • Slither
    • Aderyn
  • Fuzzing / Invariant Tests
    • Foundry
    • Echidna
    • Consensys
  • Formal Verification
    • Certora
    • Solidity SMT Checker
    • Maat
    • Manticore
  • AI
  • Tooling vs Humans

Attacker vs. Defender mindset

  • Always learning

Top Attack Vectors

  • Top attack vectors

Top DeFi & Web3 Attack Vectors from the first half of 2024


πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“

πŸ“ Exercise: Sign up for one security/web3 newsletter!

Section 2 NFT

πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“πŸ“

(back to top) ⬆️

🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒

Important Note: We are now going to do audits. Please note, that we will not find all the bugs in each codebase. Each codebase was designed to show you a specific set of bugs, and give you a good understanding of what an audit "feels" like.

🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒🟒

⛳️ Section 3: Your first audit (security review) | PasswordStore Audit


Smart Contract Audit & Security Review, PasswordStore


πŸ’» Security Review CodeV1: https://sepolia.etherscan.io/address/0x2ecf6ad327776bf966893c96efb24c9747f6694b

πŸ’» Security Review CodeV2: https://github.com/Cyfrin/3-passwordstore-audit

πŸ’» Security Review CodeV3: https://github.com/Cyfrin/3-passwordstore-audit/tree/onboarded

πŸ’» Security Review Final: https://github.com/Cyfrin/3-passwordstore-audit/tree/audit-data

Feel free to look ahead and try to find the bugs on the codebase yourself, or get familiar with the protocol first.

Remember the phases!

πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½πŸ”½

  • Initial Review
      1. Scoping
      1. Reconnaissance
      1. Vulnerability identification
      1. Reporting

πŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”ΌπŸ”Ό

For this demo, we are ignoring the last 2 phases

  • Protocol fixes
      1. Fixes issues
      1. Retests and adds tests
  • Mitigation Review
      1. Reconnaissance
      1. Vulnerability identification
      1. Reporting

The Setup (Scoping): PasswordStore

V1

V2

  • Client onboarding: Minimal

V3

  • cloc

"The Tincho"

Exploits (Vulnerability Identification)

Exploits: Access Controls

  • Missing onlyowner
    • Access Controls
      • Unprotected sensitive functions
      • Role misconfiguration
      • Privilege escalation

Exploits: Private Data

  • Storing a secret (private data is not private)

More Recon

  • coverage

Writing your first finding

  • Write finding
    • How to write a good finding
    • Title: Root Cause + Impact
    • Finding Layout:
### [S-#] Title (ROOT CAUSE + IMPACT)

**Description:** 

**Impact:** 

**Proof of Concept:**

**Recommended Mitigation:** 
  • Write PoC
  • Mitigation
  • Using AI

Are we done?

Your first report (Reporting)

πŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯š

πŸ₯š Exercises:

  1. Sign up for CodeHawks!
  2. Tweet about your first audit!

Section 3 NFT

πŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯šπŸ₯š

(back to top) ⬆️

🐢 Section 4: Manual & Static Analysis | Puppy Raffle Audit

βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…

This is the BEST security review for new auditors, 100% be sure to pay attention to this section.

βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…βœ…

This is the go-to best starter audit/security review. There are a lot of bugs in here, some obvious, some not.


Smart Contract Audit & Security Review, Puppy Raffle


πŸ’» Security Review Code: https://github.com/Cyfrin/4-puppy-raffle-audit

Concepts you'll learn: Static analysis, Reentrancy, Weak RNG, Arithmetic issues, How to write a professional looking report.

Tooling: Static Analysis

Scoping & Reconnaissance: Puppy Raffle

Exploits: DoS (Denial of service)

  • Fixes:
    • Remove unnecessary loops

Exploits: Reentrancy

Exploits: Weak RNG

Exploits: Arithmetic issues

Exploits: Poor ETH Handling

Informational Findings

  • Stict Solc Versioning
  • Supply Chain Attacks
  • Magic Numbers

Gas Audits

Code Maturity

  • Code coverage

Static Analysis, follow up

What is a Competitive Audit?

Writing the report: Puppy Raffle

πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€

πŸ§‘β€πŸš€ Exercises:

  1. Ethernaut Challenges (1, 9, and 10) πŸ§‘β€πŸš€
  2. Sign up for Solodit
  3. Post a tweet about how you completed the Puppy Raffle Audit!
  4. Sign up for farcaster
  5. Do a CodeHawks First Flight

Section 4 NFT

πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€πŸ§‘β€πŸš€

(back to top) ⬆️

πŸ”„ Section 5: Invariants & Intro to DeFi | TSwap Audit


Smart Contract Audit & Security Review, T-Swap


πŸ’» Security Review Code: https://github.com/Cyfrin/5-t-swap-audit

Concepts you'll learn: Stateful fuzzing, Fuzzing, Invariants, FREI-PI/CEII, Advanced DeFi, AMMs, Uniswap, Curve.fi, Constant product formula

πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘

STOP!

Don't look at the contracts for this one!

We are going to show you how you can use advanced tools to find even more bugs just by properly understanding invariants and writing more effective test suites.

πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘πŸ›‘

The Setup (Scoping): T-Swap

  • Client onboarding: Extensive

Reconnaissance: T-Swap

Intro to DeFi/OnChain Finance

Tooling: T-Swap

Exploits: Weird ERC20s

Exploits: Core Invariant breaking

  • Case Study:

Design Patterns: T-Swap

  • FREI-PI / CEII / Pre & Post Checks

πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°

πŸ’° Exercises:

  1. Write a fuzz test to find a bug in this challenge
  2. Write a tweet thread about an interesting finding from Solodit

Section 5 NFT

πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°

🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊

Congratulations!!

If you've made it this far in the course and you understand what's going on, you have the skills to start getting paid as a security researcher, doing competitive audits, bug bounties, or even get hired!

But if you want to become one of the best in the world and really secure web3, keep going...

🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊

(back to top) ⬆️

🌩️ Section 6: Centralization, Proxies, and Oracles | Thunder Loan Audit


Smart Contract Audit & Security Review, Thunder Loan


πŸ’» Security Review Code: https://github.com/Cyfrin/6-thunder-loan-audit

We are staritng to get more advanced with DeFi and smart contract issues. Buckle up, we are getting hotter.

Scoping & Reconnaissance: Thunder Loan

DeFi: Borrowing & Lending

Malicious Scope

  • Don't "yes-man" every audit

Tooling: Thunder Loan

Exploits: Failure to initialize

Exploits: Storage collision

Exploits: Centralization

  • Silent Upgrades
  • Case Study: Oasis

Exploits: Missing events

Exploits: Bad Upgrade

Exploits: Oracle & Price Manipulation

Design Patterns: Thunder Loan

  • Pull over push

πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦

πŸ“¦ Exercises:

  1. YAcademy Proxy
  2. Tweet about how YOU feel about upgradeable smart contracts

Section 6 NFT

πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦πŸ“¦

(back to top) ⬆️

πŸŒ‰ Section 7: Bridges, Chains, Signatures, Intro to Yul/Assembly | Bridge Boss Audit


Smart Contract Audit & Security Review, Boss Bridge


πŸ’» Security Review Code: https://github.com/Cyfrin/7-boss-bridge-audit

Tooling: Boss Bridge

Scoping & Reconnaissance: Boss Bridge

Exploits: Opcode Support

Exploits: Signature Replay

Exploits: ERC20 Contract Approval

Exploits: Unlimited Minting

Bridge Hacks

  • Bridge hacks: Ronin, Poly network, Nomad, Wormhole

Writing the report: Boss Bridge

Design Patterns: Boss Bridge

  • Emergency stop

πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°

πŸ’° Exercises:

  1. Damn Vulnerable DeFi Challenges 1, 2, 4
  2. Write a tweet thread about an interesting finding from Solodit
  3. Tweet about how you finished the hardest audit yet!
  4. Read about more historic attacks:
    1. Signature Replay
    2. Merkle tree signature issues
    3. Polygon Double Spend
    4. Nomad Bridge Hack

Section 7 NFT

πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°πŸ’°

(back to top) ⬆️

Section 7.5: MEV & Governance


Smart Contract Audit & Security Review, MEV


Introduction to MEV

  • MEV Explained
  • MEV Explained continued
  • Toxic MEV
    • Frontrunning
    • Sandwich Attacks
  • non-toxic
    • Backrunning
  • MEV Protection
  • MEV in our past security reviews:
    • Puppy:
      • Someone can front-run selectWinner to call a refund
    • T-Swap:
      • Deadline protection means people can "sandwhich" attack you
    • Thunder Loan:
      • Users can front run flash loans to make the fees higher or lower
    • Boss Bridge:
      • A signed transaction could be front run so that an attacker sends tokens from an L2 before the signer can
  • Slippage Protection

Exploits: Governance Attack

  • Unlimited Minting
  • Flash Loan Voting
  • Case Study: Beanstalk
  • Metamorphic upgrades
    • Case Study: TORN Governance

πŸ›‘οΈ Section 8: (THE FINAL BOSS AUDIT) MEV, Nodes, & DAOs | Vault Guardians Audit


Smart Contract Audit & Security Review, Vault Guardians


This security review is optional. It's a LOT of code! But if you choose to do it, you'll get a better idea of what a larger codebase feels like. Being comfortable coming up to a codebase and saying "I'll eventually understand this codebase, but right now I don't" is important!

πŸ’» Security Review Code: https://github.com/Cyfrin/8-vault-guardians-audit

Concepts: Vault Guardians

Good luck :)

πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…

πŸ¦… Exercises:

  1. 1st CodeHawks Competitive Audit
  2. Write a tweet thread about an interesting finding from Solodit
  3. Write a blog or tweet on your experience!
  4. Read these tips for auditing multi-chain protocols

Section 8 NFT

πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…

πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…

First CodeHawks Competitive Audit

  • How to submit a finding
  • How to decide severity
  • Where to find a competitive audit

πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…

πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…πŸ¦…

(back to top) ⬆️

🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊

Congratulations!!

If you've made it this far in the course and you understand what's going on, you have the skills to become one of the top security researchers in web3! Either as a solo auditor, freelancer, competitive auditor, or even get hired by a top firm!

However... if you want to be on the cutting edge and be able to understand every nook in web3, you've got a little more to go...

🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊

Part 2 has been moved!

Update on Wallets, Post-deployment, EVM Opcodes, Assembly, and Formal Verification

The next sections (originally just called "part 2") have been moved to their own courses!

Highly Recommend

We highly recommend takin these two courses (linked above) so you can have a thorough grasp of all things EVM.

(back to top) ⬆️

Congratulations

🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊 Completed The Course! 🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊🎊

If you've made it this far... wow.

Where do I go now?

Learning More

Disclosures

The Cyfrin team runs CodeHawks, Cyfrin Updraft, and private security reviews. They are an advisor to the Peeranha project, and run various blockchain nodes like Chainlink & Ethereum. Additionally, the are responsible for the creation of the Aderyn and Solodit tools.

Thank you

Sponsors

Lead Lecturers / Code Builders

Guest Lecturers

Special thanks

More Security Stuff

Sponsors

Big thanks to our sponsors/donors!!

Huge Extra Thank YOU

Thanks to everyone who is taking, participating in, and working on this course. These courses are passion project data dumps for everyone in the web3 ecosystem.

Let's level up so we can keep web3 safer, and thank you again for taking this course!

Cyfrin Twitter Cyfrin YouTube

(back to top) ⬆️

About

The ultimate, most advanced, security, DeFi, assembly, web3 auditor course ever created.

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published