Summary
Security is one of the most influential factors when developing a smart contract. No organization can afford a vulnerable smart contract. Organizations are now spending substantial funds on getting their smart contracts audited by security specialists and firms. Multiple tools that automate code analysis and linting smart contracts from a security perspective are available to fix security bugs. Security is important and cannot be ignored.
In this chapter, we saw how Solidity is maturing in fixing some of the underlying issues related to integer overflow and underflow and how it is incorporating safe math within the EVM itself.
Next, we saw how to implement non-secure contracts and how hackers can mount reentrancy attacks on such contracts. This led to a discussion on some of the security best practices that should be implemented by every Solidity developer to ensure that deployed contracts are secure with a minimum attack surface area.
The next chapter will focus...