Open in app

Sign in

Write

Sign in

Olympix

40 Followers

Home

About

Nov 21

Poloniex Cryptocurrency Exchange Hack Analysis

Introduction On November 10, 2023, the cryptocurrency world was again shaken by a significant security breach targeting the prominent cryptocurrency exchange Poloniex. The incident resulted in the theft of over $120 million in digital assets, making it the second-largest private key compromise in 2023.

Blockchain

4 min read

Poloniex Cryptocurrency Exchange Hack Analysis
Poloniex Cryptocurrency Exchange Hack Analysis
Blockchain

4 min read


Oct 19

Web3 Security Best Practices: Safeguarding Your Digital Assets in a Decentralized World

In the rapidly evolving landscape of Web3, where decentralization and digital assets reign supreme, ensuring the security of your holdings has never been more critical. This article thoroughly explores Web3 security best practices, delving into the technical aspects that can help you safeguard your digital assets effectively. Introduction Web3, powered by…

Smart Contract Security

3 min read

Web3 Security Best Practices: Safeguarding Your Digital Assets in a Decentralized World
Web3 Security Best Practices: Safeguarding Your Digital Assets in a Decentralized World
Smart Contract Security

3 min read


Sep 27

Remitano’s Hot Wallet Hacked

In Brief Remitano suffered a $2.7M loss due to a private key compromise. GAMBL’s recommendation system was exploited. DAppSocial lost $530K due to a logic vulnerability. Rocketswap’s private keys were inadvertently deployed on the server. Hacks Hacks Analysis Remitano | Amount Lost: $2.7M On September 14th, the Remitano exploit on the Ethereum Mainnet resulted in a $2.7 million loss. The…

Web3

3 min read

Remitano’s Hot Wallet Hacked
Remitano’s Hot Wallet Hacked
Web3

3 min read


Sep 22

Stake.com Targeted in $41M Hack

In Brief Stake suffered a $41M loss due to a private key compromise. Zunami was exploited due to price manipulation. EarningFarm lost $530K due to reentrancy vulnerability. Steadefi’s protocol deployer wallet was compromised. Hacks Hacks Analysis Stake | Amount Lost: $41M On September 6, the Stake exploit on multiple chains resulted in a $41M loss. The root cause was the…

Defi

3 min read

Stake.com Targeted in $41M Hack
Stake.com Targeted in $41M Hack
Defi

3 min read


Jul 11

Olympix Announces Close Of $4.3M Seed Round

My name is Channi Greenwall, and I’m the founder and CEO of Olympix. While I’m thrilled to announce our recently closed $4.3M …

6 min read

Olympix Announces Close Of $4.3M Seed Round
Olympix Announces Close Of $4.3M Seed Round

6 min read


May 11

Ethereum Development Frameworks

Development environments are used for building decentralized applications and deploying smart contracts on blockchain networks. As the Ethereum ecosystem continues to grow, the need for powerful development frameworks has become increasingly important. In this article, we will go through four popular Ethereum development environments: Hardhat, Foundry, Brownie, and Truffle. Hardhat …

2 min read

Ethereum Development Frameworks
Ethereum Development Frameworks

2 min read


May 3

Locked Ether Vulnerability in Smart Contracts

Smart contracts are vulnerable to various security flaws. One of these flaws is the locked ether vulnerability, which can result in funds being trapped in a contract indefinitely. In this article, we will discuss the locked ether vulnerability and how the Olympix static analyzer can help identify it. What Makes…

2 min read

Locked Ether Vulnerability in Smart Contracts
Locked Ether Vulnerability in Smart Contracts

2 min read


Apr 26

Unchecked Call Return Values

In Solidity, smart contracts can interact with other smart contracts through several functions such as transfer(), send(), and call(). These functions allow a contract to call a function in another contract and receive the returned value. However, if the return value is not properly checked, it can lead to vulnerabilities. …

2 min read

Unchecked Call Return Values
Unchecked Call Return Values

2 min read


Apr 19

Integer Overflows and Underflows in <0.8 Solidity Smart Contracts

Integer overflows and underflows are a common source of vulnerabilities in <0.8 Solidity smart contracts. In this post, we’ll explore what integer overflows and underflows are and how vulnerabilities can be remedied. What are Integer Overflows and Underflows? In Solidity, integers are represented using a fixed number of bits. For…

3 min read

Integer Overflows and Underflows in <0.8 Solidity Smart Contracts
Integer Overflows and Underflows in <0.8 Solidity Smart Contracts

3 min read


Apr 17

Upgradable Smart Contracts

Upgradable Smart Contracts and How Proxy Contracts Work Smart contracts have a unique feature of autonomous execution of code on the blockchain. However, once deployed, they become immutable and cannot be updated. Upgradable smart contracts, also known as smart contract proxies, offer a solution to this problem. What are Upgradable…

Smart Contracts

2 min read

Upgradable Smart Contracts
Upgradable Smart Contracts
Smart Contracts

2 min read

Olympix

Olympix

40 Followers

The future of web3 security.

Help

Status

About

Careers

Blog

Privacy

Terms

Text to speech

Teams