We are going to demonstrate common security vulnerabilities by live hacking a deployed smart contract. We will use Re-entrancy vulnerabilities to steal money from a contract and then go over how to prevent these attacks in your smart contracts.
Comments
Powered by: Proof-of-Talent