EIP 7514: Balancing Urgency With Long Term Vision

💡 Ethereum Staking Scenarios: What the Future Might Hold

Motivation

The proposed change aims to slow down the growth in the number of validators, providing time to implement essential adjustments. Preliminary tests indicate that the validator client software starts to falter when handling around 2.1 million validators.

Given that the current validator count is over 800,000, as indicated by beaconcha.in , there’s an urgent need to address this issue.

alt text

[Read more]

Poison Block Explorer Byte Code

You will understand how to trick a block explorer into displaying different byte code of your choosing, other than the one deployed on the chain.

This is important because a user can be tricked by a hacker to think they interact with a good contract, when actually the user interacts with malicious contract. It is indeed the same contract address, but the byte code is not the one reported by the block explorer.

[Read more]

How to Exploit Ethereum in a Virtual Environment

This is going to be a series about some of the techniques I implemented when designing Karl , a free tool that finds exploitable code in live smart contracts.

When I monitor the Ethereum blockchain for vulnerable contracts, I need a way to determine if the vulnerabilities I find are the real thing, or merely a scattering of false positives and honeypots. I’ve been able to mitigate this possibility by testing for vulnerabilities in a virtual copy of the blockchain.

[Read more]