On Decentralized Finance (DeFi): Exploring the Major Security Analysis Tools used to Detect or Minimize Potential Attacks on the Smart Contract.

1. Smart contact security analysis tools

2. Some Recommendations Based on well-known Best Practices for Securing Smart Contract Vulnerability Attacks.

Fig. 1 describes the sample contract activity tracker.
Fig.2 illustrates the example of a contract event modifier that results in reentrancy.

2.2 Best practices for Ethereum Smart Contracts Security

Fig. 3 describes a sample contract code that may lead to loss of b

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store