This long-form blog post written by Sigma Prime walks the reader through all of the known attack vectors an EVM-based Smart Contract can expose.
Every vulnerability is described and discussed in a structured, 3-part writeup. At first the vulnerability is explained in great detail, next up preventative techniques are shown, followed by examples where the discussed security hole has been exploited in the past.
Note: The blog post was turned into a GitHub repository which welcomes contributions to keep the document as up-to-date as possible.
- Sigma Prime