See You in April | SlowMist Invites You to Join the Hong Kong Web3 Festival and Other Industry…See you in Hong Kong this April!1d ago11d ago1
Fatal Residue | An On-Chain Heist Triggered by Transient StorageThe attacker exploited the values in transient storage that were not cleared after the function call to bypass the permission checks.2d ago2d ago
Hacker’s Perspective: How to Say Hi to CZ with 0.01 BNBIt is recommended that the project team synchronize necessary security checks in both on-chain and off-chain code as much as possible.5d ago5d ago
In-Depth Discussion on EIP-7702 and Best PracticesThis article discusses the upcoming EIP-7702 proposal in Ethereum’s upcoming Pectra upgrade.Mar 27Mar 27
SlowMist Releases Japanese Edition of the “Web3 Project Security Handbook”We aim to build a trusted security zone through professional research and hands-on experience.Mar 25Mar 25
Intro to Smart Contract Security Auditing — Deploying Different Contracts to the Same AddressThis article explains the attack techniques using the CREATE and CREATE2 opcodes and their corresponding defense strategies.Mar 21Mar 21
Cross-Chain Protocol Analysis Series: THORChainThis article explores THORChain’s mechanism and cross-chain address analysis.Mar 212Mar 212
Hong Kong Web3 Festival | A Quick Overview of SlowMist’s Event ScheduleYesterday, we officially launched the Call for Papers, inviting security researchers, developers, and compliance experts worldwide to…Mar 15Mar 15
Hong Kong Web3 Festival | SlowMist Hacking Time Invites You to Explore the Frontiers of Security…From April 6 to 9, 2025, the third Hong Kong Web3 Festival, co-hosted by Wanxiang Blockchain Labs and HashKey Group, will be grandly held…Mar 13Mar 13