Summary In this talk, the speakers discuss the importance of security in Ethereum and how to make contracts more secure. They highlight the need for collaboration and education in the community to improve security. Highlights 🛡 Security is a crucial aspect of blockchain, and it is important to make contracts more secure and less vulnerable. 🌍 Collaboration and sharing knowledge with the community are essential for the common good of Ethereum. 🔒 The application layer of Ethereum has seen improvements in security over time, but there is still work to be done. 💼 Security services, internal security teams, and public reports have contributed to improving security within the Ethereum ecosystem. 💡 To enhance security, focus on making the application layer more resilient and prioritize projects aligned with Ethereum's long-term survival. 📚 Education, articles, videos, and onboarding new researchers can help scale security efforts. 🤝 The speakers are part of the Redguild, an emerging Latin American security team that conducts research, education, and outreach to support the Ethereum ecosystem. Transcript The speakers discuss the importance of security in Ethereum and the need for more secure contracts. They highlight the collaboration and education needed to improve security for the common good of Ethereum. The application layer of Ethereum has seen improvements in security over time. Various security services and internal teams have contributed to enhancing security. The speakers emphasize the need to make the application layer more resilient and prioritize valuable projects aligned with Ethereum's long-term survival. They mention their involvement in the Redguild, an emerging Latin American security team supporting the Ethereum ecosystem. The speakers discuss their research, education, and outreach efforts to bridge the technological gap and improve security.
It is called by the Deployer Contract not by the EOA account. EOA which is the attacker triggers only Deployer contract which is the owner of the Prop. factory hence can selfdestruct it
Excelente el video! Ahora sí entiendo account abstraction! Una duda me quedó: on-chain se ejecutan las mismas validaciones que hace el bundler? O algunas no? Por ejemplo no ví que en el código on-chain se analizaran los forbidden bytecodes (no sé si sería posible hacerlo, tampoco)