In this chapter, we will cover the following recipes:
- Integer overflow and underflow
- Re-entrancy attack
- The parity hack
- Forcing Ether to a contract
- Using private variables
- Transaction Ordering Dependence
- Call to the unknown
- DoS using loops
- Security analysis tools for solidity
- Uninitialized storage pointer in solidity
- Best practices in solidity