Hacker’s Perspective: How to Say Hi to CZ with 0.01 BNBIt is recommended that the project team synchronize necessary security checks in both on-chain and off-chain code as much as possible.2d ago2d ago
In-Depth Discussion on EIP-7702 and Best PracticesThis article discusses the upcoming EIP-7702 proposal in Ethereum’s upcoming Pectra upgrade.3d ago3d ago
SlowMist Releases Japanese Edition of the “Web3 Project Security Handbook”We aim to build a trusted security zone through professional research and hands-on experience.5d ago5d ago
Intro to Smart Contract Security Auditing — Deploying Different Contracts to the Same AddressThis article explains the attack techniques using the CREATE and CREATE2 opcodes and their corresponding defense strategies.Mar 21Mar 21
Cross-Chain Protocol Analysis Series: THORChainThis article explores THORChain’s mechanism and cross-chain address analysis.Mar 212Mar 212
Hong Kong Web3 Festival | A Quick Overview of SlowMist’s Event ScheduleYesterday, we officially launched the Call for Papers, inviting security researchers, developers, and compliance experts worldwide to…Mar 15Mar 15
Hong Kong Web3 Festival | SlowMist Hacking Time Invites You to Explore the Frontiers of Security…From April 6 to 9, 2025, the third Hong Kong Web3 Festival, co-hosted by Wanxiang Blockchain Labs and HashKey Group, will be grandly held…Mar 13Mar 13
SwitchyOmega Exposed for Stealing Private Keys: How to Protect Against Plugin Tampering?Authors: Lisa & Yao Editor: LizMar 12Mar 12
Repeatedly Sanctioned: What Has the Russian Exchange Garantex Done Over the Past Three Years?Authors: Lisa & Keywolf Editor: LizMar 8Mar 8