A Broad Overview of Reentrancy Attacks in Solidity Contracts
This quick guide gives a deep dive into everything you need to know about reentrancy manipulation.
This quick guide gives a deep dive into everything you need to know about reentrancy manipulation.
This guide will cover smart contract wallets in depth and the unique and complex threat vectors to be aware of when interacting with them. We will also list some best practices to secure funds.
This guide will define and list the various types of crypto wallets as well as their common security risks and threats. Lastly, it will cover the best security practices for your crypto wallet.
This guide will touch on recent hacks in the NFT space, risks to NFT communities and smart contracts, and security best practices for NFT projects.
JSON Web Tokens (JWT) are one way to protect web resources. This guide walks through the process of creating a React app that will fetch a JWT from our backend server (Express.js) and then use it to request and display the blockchain data on our front end.
This guide will teach you various strategies to protect your endpoint when using a front end.
Learn how to enhance the security of your QuickNode endpoint with Endpoint Armor, a powerful tool that enables method-specific restrictions and customizable rate limits for both overall endpoint traffic and individual visitors.
This guide will cover node security fundamentals, common attack vectors, and tips on how to strengthen your node's security.
Security is an important part of developing a resilient Web3 application. In this guide, we cover one of QuickNode's endpoint security features which enables developers to create multiple authentication tokens for a single blockchain endpoint.
In this guide, you will learn how to ensure the integrity and authenticity of incoming webhook messages by verifying HMAC signatures using Python. You will retrieve the necessary headers, prepare the payload, and execute a Python script to perform signature verification.
This guide explores the concept of stealth addresses within blockchains, specifically focusing on Ethereum's ERC-5564 proposal, addressing the privacy concerns in transaction visibility. It will delve into the technicalities of this solution and demonstrate its application through Umbra Cash, offering a practical perspective on enhancing transaction privacy.