当前位置:网站首页>How to identify contractual issues
How to identify contractual issues
2022-06-26 15:51:00 【NFT practitioner】
Contract of offer
1. For example, when you are not sure whether a token is a token or not , It can be used honeypot Do a simple check .
If appear :Yup, honeypot. Run the fuck away
ETH Contract inspection :https://honeypot.is/ethereum.html
BSC Contract inspection :https://honeypot.is/index.html
Of course ,honeypot Just for ERC Basic check of contract code , The encapsulated code still needs to be viewed manually . See this article for details , in general , There are many kinds of contract attacks on the market , It's very complicated for Xiaobai . https://freebuf.com/articles/blockchain-articles/175915.html
https://t.co/C43JM7XbPB
2. Of course , We can also see whether these contracts have been audited by the security company , That is why at first I strongly recommended $people The reason for safety audit , at present people The audit report has been issued , I'm very glad to . Somewhat token stay coinmarketcap You can view the audit report Some need to check the official website of the audit company Audit query : https://slowmist.com/en/service-smart-contract-security-audit.html
3.Token Chip distribution For simple cases , The chips have not been broken up , You can directly view the block browser , Click on holder see . If a project , Officials hold 99% The above chips , Address is not oversigned , The identity information of the project party is not transparent , Then you need to be careful . ETH browser :https://etherscan.io BSC browser :https://bscscan.com

4.Token Chip distribution For simple cases , The chips have not been broken up , You can directly view the block browser , Click on holder see . If a project , Officials hold 99% The above chips , Address is not oversigned , The identity information of the project party is not transparent , Then you need to be careful .
ETH browser :https://etherscan.io
BSC browser :https://bscscan.
5. Dangerous signature This kind of signature is mainly to call the transfer authority of other tokens , Forcibly transfer tokens from your wallet , After signing, you can see that these parameters call .

Most of these attacks occur in the false airdrop , Fishing attacks and crimes committed by acquaintances . When you sign, you see approve When , Be careful and be careful , Generally, these operations are performed by uni Certified contract address on . Just sign and see approve, Cancel first . Find out whether there is any similar experience of being cheated on the Internet ,approve Is your address trusted .
6. The fake private key is leaked There is no picture here , Probably the cheater sent a string of private keys , Let me tell you that there are some in this address uni Tokens, , Complimentary , Whoever gets it will own it . You can import the private key , It does have some value Token, But not in the wallet ETH, So you try to send some ETH To this address as a service charge . The address was just received ETH, He was immediately transferred by the swindler .
边栏推荐
- Is it safe to open a new bond registration account? Is there any risk?
- NFT 平台安全指南(1)
- 5000 word analysis: the way of container security attack and defense in actual combat scenarios
- A blog to thoroughly master the theory and practice of particle filter (PF) (matlab version)
- Solana capacity expansion mechanism analysis (2): an extreme attempt to sacrifice availability for efficiency | catchervc research
- svg canvas画布拖拽
- 9 Tensorboard的使用
- OpenSea上如何创建自己的NFT(Polygon)
- nanoPi Duo2连接wifi
- 粒子滤波 PF——在机动目标跟踪中的应用(粒子滤波VS扩展卡尔曼滤波)
猜你喜欢
Mr. Du said that the website was updated with illustrations

评价——TOPSIS

Tweenmax+svg switch color animation scene

IntelliJ idea -- Method for formatting SQL files

Everyone is a scientist free gas experience Mint love crash

STEPN 新手入門及進階

Solana capacity expansion mechanism analysis (1): an extreme attempt to sacrifice availability for efficiency | catchervc research

PCIe Capabilities List

效率超级加倍!pycharm十个小技巧就是这么神
![[C language practice - printing hollow upper triangle and its deformation]](/img/56/6a88b3d8de32a3215399f915bba33e.png)
[C language practice - printing hollow upper triangle and its deformation]
随机推荐
Have you ever had a Kindle with a keyboard?
[applet practice series] Introduction to the registration life cycle of the applet framework page
CNN optimized trick
Auto Sharding Policy will apply Data Sharding policy as it failed to apply file Sharding Policy
Binding method of multiple sub control signal slots under QT
Solana扩容机制分析(2):牺牲可用性换取高效率的极端尝试 | CatcherVC Research
IntelliJ idea -- Method for formatting SQL files
Audio and video learning (I) -- PTZ control principle
查词翻译类应用使用数据接口api总结
svg上升的彩色气泡动画
Evaluate:huggingface detailed introduction to the evaluation index module
IDEA本地代理后,无法下载插件
Evaluation - TOPSIS
5000字解析:实战化场景下的容器安全攻防之道
零知识 QAP 问题的转化
音视频学习(二)——帧率、码流和分辨率
Audio and video learning (II) -- frame rate, code stream and resolution
NFT 平台安全指南(2)
Is it safe to open an account for mobile stock registration? Is there any risk?
svg野人动画代码