My Study Methodology

Поделиться
HTML-код
  • Опубликовано: 26 авг 2024
  • My note taking methodology for studying previous audit findings on code4rena.
    Code4rena reports:
    code4rena.com/...
    Tomo's Blog:
    tom-sol.notion...
    Joplin:
    joplinapp.org/

Комментарии • 44

  • @neoliu3125
    @neoliu3125 Год назад +13

    Great video, your video helped me a lot on my web3 learning journey

  • @loop4303
    @loop4303 Год назад +9

    Thank you. This is what I need. 🙏

    • @andyli
      @andyli  Год назад +1

      You’re welcome 😊

  • @erayack
    @erayack Год назад +4

    As far as I understand, you don't just index the errors you find in the reports on Joplin. You also try to understand and learn from mistakes. Joplin actually becomes a checklist for your own audits.

    • @andyli
      @andyli  Год назад

      Yep that is a good description

  • @soaphornseuo8630
    @soaphornseuo8630 Год назад +3

    Thank brother for your sharing

  • @sye3193
    @sye3193 Год назад +5

    Thank you, that was great and quick advice:)

    • @andyli
      @andyli  Год назад

      Glad it was helpful!

  • @tangjunnz
    @tangjunnz Год назад +7

    Thanks for your video 👍

  • @user-dm7bw9os7w
    @user-dm7bw9os7w Год назад +6

    informative !

  • @Jansen-Moreira
    @Jansen-Moreira Год назад +2

    Thanks! It helped a lot

  • @satyabratadash2858
    @satyabratadash2858 Год назад +3

    I recently joined code arena, what is the proper way to right the bugs and submit them.

    • @andyli
      @andyli  Год назад +3

      Combine QA/Gas findings into a single report, submit medium and highs individually. There is no set guideline, refer to the previous reports for how other people are formatting it

  • @andywang4189
    @andywang4189 Год назад

    Thanks, very helpful

  • @jiggle546
    @jiggle546 9 месяцев назад

    Can you repost your Anki Study video? I found that video very helpful when it came to earning my A+.

  • @satyabratadash2858
    @satyabratadash2858 Год назад +1

    Hi, sorry for bothering you again,
    In Contest, under the Attack Surface section they list down a no. Of possible hacks for a .Sol file,
    Is that means when auditor try to auditing that perticular .Sol file he have to take extra concern about those bugs.

    • @andyli
      @andyli  Год назад +1

      Yes, correct

  • @theybecameus
    @theybecameus Год назад +3

    What is the salary range in Perth for a person who has OSWE and has 1.5 years working experience in a company. Asking u coz u work there

    • @andyli
      @andyli  Год назад

      I think 100-110k

  • @lacag-lacag
    @lacag-lacag Год назад

    Next video how do you choose which vulnerability should look for in the project Code

    • @andyli
      @andyli  Год назад

      Be focused when studying, but when bug hunting I look for everything 😁

  • @satyabratadash2858
    @satyabratadash2858 Год назад +1

    Hi Andy, I'm bigginer to SmartContract Auditing, i have previous experience as a contract developer but not that much,
    When i try to audit contract especially which are very large where many Sol file interacts with each other, I got more confused, at a point all my energy drain out.
    At this point of time i only able to find gas optimization and some low level, some or all popular findings that mentioned on secureum,
    I want to learn how to find vulnerabilities related core functionality of contract, like high and medium findings listed on reports on Codearena,
    Can you guide me, what should my approch to find those high and medium when i got a large contract ??
    Thank you .

    • @andyli
      @andyli  Год назад +2

      I know what code base you are talking about😂
      I would recommend some visualization tools to help understand the project. A lot of experienced auditors talk about reading the base contract first then the derived contracts that inherit from it. Sol2uml helps with that: github.com/naddison36/sol2uml
      Another tool you can use to understand call flows is: github.com/ConsenSys/surya

    • @satyabratadash2858
      @satyabratadash2858 Год назад +1

      Thanks for reply

  • @justiceessiel6123
    @justiceessiel6123 Год назад +1

    Do you have a course on your channel that is on smart contract auditing that would make one get a job from a web3 dev to smart contract auditor

    • @andyli
      @andyli  Год назад

      I made a beginner road map video where I basically shared all the resources I used

  • @satyabratadash2858
    @satyabratadash2858 Год назад

    What is the meaning of context in Scops and their corresponding percentage for .Sol file in CodeArena contents

    • @andyli
      @andyli  Год назад

      Test coverage

  • @sye3193
    @sye3193 Год назад

    Will you please make a video on ZIION VM its tools, use, and all other cool stuff as a security testing perspective

    • @andyli
      @andyli  Год назад +1

      I have not tried ZIION VM yet, will check it out

    • @andyli
      @andyli  Год назад +1

      I'll be happy if it just comes with solc-select pre installed

    • @sye3193
      @sye3193 Год назад +1

      @@andyli yea it's included XD

    • @andyli
      @andyli  Год назад +1

      love it

  • @erayack
    @erayack Год назад

    What do you think about Paradigm CTF? a video will be good.

    • @andyli
      @andyli  Год назад

      Paradigm CTF is great, will look into making a video of it

    • @erayack
      @erayack Год назад

      @@andyli I guess we can still enter and see the challenges. it would be really great

  • @sudonoodle1773
    @sudonoodle1773 Год назад

    Hi Andy. Are you still doing traditional penetration testing as your day job? Or have you transitioned towards Web3?
    Like you’ve mentioned in your previous videos, Web3 security is becoming (just as) saturated as traditional pentesting. I’ve been avoiding Web3 because I’m worried it’s just an industry phase… but now I’m not too sure.
    What are your thoughts? Perhaps a video on this would be great.
    Love your videos, thanks very much! :)

    • @andyli
      @andyli  Год назад +3

      Yeah I am still working as a traditional pentester, honestly I am thinking about transitioning though.
      It is getting saturated in terms of getting a quick buck from these bounties, but long-term it is still going to pay massive dividends.
      I also used to think web3 it was a fad too due to the scammy nature of the space, but realized there are legit work being done as well.