{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/en\/","title":"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"et9GpdRPpr\"><a href=\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\">HACONTI: Cybersecurity Challenges in Smart Contracts<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/embed\/#?secret=et9GpdRPpr\" width=\"600\" height=\"338\" title=\"&#8220;HACONTI: Cybersecurity Challenges in Smart Contracts&#8221; &#8212; LACNIC Blog\" data-secret=\"et9GpdRPpr\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","thumbnail_width":680,"thumbnail_height":330,"description":"By Juan Sch\u00e4llibaum, Application Security Engineer at Ual\u00e1 Introduction Smart contracts are transforming the way we transact and manage digital assets on the Ethereum blockchain. However, like any software, they can be vulnerable to security issues. A clear example of this was the 2016 DAO Hack, where an attacker exploited a vulnerability to steal 3.54 [&hellip;]"}