People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!
TSTORE and TLOAD opcodes. A great use case for this is reentrancy flags. With new functionality comes new bugs!UniswapPool address into storage slot 1. amount that was minted is stored into this slot. The problem is that the amount is never cleaned up! amount and UniswapPool use slot 1 of transient storage. Since the amount being minted is a user controlled number, the attacker used this property to write an address they controlled with the amount value. Now that this was set, they were able to bypass the UniswapPool verification check to call the contract to steal all of the funds in the callback.