You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
-16Lines changed: 0 additions & 16 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,14 +6,6 @@ This workshop will walk you through the basics of securing smart contracts by te
6
6
7
7
In this workshop we will be protecting a governance heavy application from the consequences of malicious upgrades and or deployment scripts.
8
8
9
-
## Bug Types
10
-
-**Deployment** - Incorrect parameters, caught with a validation
11
-
-**Deployment** - Incorrect parameters, caught with an integration test ✓
12
-
****
13
-
-**Upgrade** - Storage offset changes, caught with an integration test, also caught with a validation
14
-
-**Upgrade** - Logic error, caught with an integration test
15
-
****
16
-
17
9
### Further Reading
18
10
19
11
For governance safety assistance, refer to our [forge proposal simulator](https://github.com/solidity-labs-io/forge-proposal-simulator) tool. See the [security checklist](https://github.com/solidity-labs-io/code-review-checklist) and [security](https://medium.com/@elliotfriedman3/a-security-stack-4aedd8617e8b)[stack](https://medium.com/@elliotfriedman3/a-security-stack-part-2-aaacbbf77346) for a list of items to consider when building a smart contract system.
@@ -31,11 +23,3 @@ Make sure the latest version of foundry is installed. If not, run:
31
23
```bash
32
24
foundryup
33
25
```
34
-
35
-
Later exercises will use the certora prover. If you need to install, first check the system prerequisites from the Certora documentation. https://docs.certora.com/en/latest/docs/user-guide/install.html
0 commit comments