Select a security module to start exploiting and patching vulnerabilities. Each path contains multiple units.
Learn how reentrancy attacks can drain funds from smart contracts
Understand how improper access control can lead to unauthorized actions
Learn how arithmetic overflow can lead to unexpected behavior
Understand the dangers of not checking return values from external calls
Learn the difference between tx.origin and msg.sender
Learn how contracts can be vulnerable to denial of service attacks
Understand how storage layout can lead to vulnerabilities in proxy contracts
Learn how transaction ordering can be exploited for profit
Learn from real-world security incidents that have cost billions. Understand what went wrong and how to prevent similar attacks.