A chronological and (hopefully) complete list of reentrancy attacks to date. (by pcaversaccio)

Reentrancy-attacks Alternatives

Similar projects and alternatives to reentrancy-attacks based on common topics and language

NOTE: The number of mentions on this list indicates mentions on common posts plus user suggested alternatives. Hence, a higher number means a better reentrancy-attacks alternative or higher similarity.

reentrancy-attacks reviews and mentions

Posts with mentions or reviews of reentrancy-attacks. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-12-02.
  • A look into formal verification of smart contracts using Certora
    5 projects | | 2 Dec 2022
    The main challenge is dealing with non-view functions. The default behavior of the prover is to assume that an external call can alter all state on every contract but the caller, noted as HAVOC_ECF. This can lead to state changes in external contracts that are unreachable, making verification more difficult. Furthermore, it assumes that the call is non-reentrant, which in reality is a frequent source of attacks. This last issue can be avoided by indicating that calls can re-enter, noted as HAVOC_ALL, but this means that an external call can mutate any state in any contract, caller included. This leaves the contract being verified in a state where we don't know anything about it after an external call is made. This severely limits what we can prove.


Basic reentrancy-attacks repo stats
11 days ago

pcaversaccio/reentrancy-attacks is an open source project licensed under GNU Affero General Public License v3.0 which is an OSI approved license.

SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives