Copy logo as SVG
Copy wordmark as SVG
Brand guidelines
Home page
Home
Audits
Services
Services
Private Audits
Industry-leading smart contract security services
Competitive Audits
Compete, hack and win prizes
First Flights
Compete, hack and win prizes
Education
Learn how to build Web3 products and audit smart contracts
Certifications
Verify your skills through industry-recognised certifications
Research Platform
The ultimate security research tool
Video tutorials
Get up and running on new features and techniques.
Documentation
All the boring stuff that you (hopefully won’t) need.
Careers
We're hiring!
We’re always looking for talented people. Join our team!
Supported Chains
Ethereum
ZKsync
Arbitrum
Optimism
Polygon
Base
Binance
Avalanche
Solana
Latest case studies
Hardening Sablier’s v2.2 Codebase
DeFi
Tokens
Interoperability
Read case study
Fortifying the security of Oku Trade Uniswap v3 and Chainlink based on-chain limit orders
DeFi
Uniswap
Chainlink
Read case study
How to get started
Jump right in — get an overview of the basics and get started on building.
Watch video
Advanced features
Once you’re ready, learn more about advanced analytics, features and shortcuts.
Watch video
All case studies
Resources
Resources
Case Studies
Learn how our customers are making big changes.
Blog
The latest industry news, updates and info.
Documentation
Learn about our tools and technology
Glossary
All things DeFi and dev in plain English.
Brand Kit
Discover Cyfrin's brand
Newsletter
Stay up to date with the latest news.
Public Reports
Check out our public security records.
About Us
Learn about our team and our mission.
Video tutorials
Get up and running on new features and techniques.
Documentation
All the boring stuff that you (hopefully won’t) need.
Careers
We're hiring!
We’re always looking for talented people. Join our team!
Socials
Twitter
Discord
YouTube
GitHub
LinkedIn
Latest blog posts
Solodit Checklist Explained (5): Griefing Attacks
Read post
Solodit Checklist Explained (4): Front-Running Attacks
Read post
Solodit Checklist Explained (3): Donation Attacks
Read post
Solodit Checklist Explained (2): Denial-of-Service Attacks Part 2
Read post
How to get started
Jump right in — get an overview of the basics and get started on building.
Watch video
Advanced features
Once you’re ready, learn more about advanced analytics, features and shortcuts.
Watch video
All blogs
Pricing
Request an audit
Resources
Glossary
All things DeFi and dev in plain English. Our glossary breaks down complex terms and concepts into relatable language, making it easier for you to grasp the essentials of decentralized finance.
Clear Filter(s)
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
Q
R
S
T
U
V
W
X
Y
Z
EIPs/ERCs
#
A
B
C
D
E
F
G
H
I
K
L
M
N
O
P
R
S
T
U
V
W
EIPs/ERCs
Reentrancy Attack
Smart Contract
VSCode
Structs
Static Analysis
Solidity Function
nSLOC
Invariant
Hash Function
Hash
Fuzz Testing
AMM
Arrays
Previous
3 / 3
Variable
Variables (Solidity Code Example)
Vault Contract (Solidity Code Example)
Vault Inflation Hack (Solidity Code Example)
Verify Signature (Vyper Code Example)
Verifying Signature (Solidity Code Example)
View and Pure Functions (Solidity Code Example)
View and Pure Functions (Vyper Code Example)
Visibility (Solidity Code Example)
WETH Permit Hack (Solidity Code Example)
Wrapped Token
Write to Any Slot (Solidity Code Example)
nSLOC
Previous