{"id":27944,"date":"2024-11-07T18:17:16","date_gmt":"2024-11-07T18:17:16","guid":{"rendered":"https:\/\/blog.lacnic.net\/?p=27944"},"modified":"2024-11-08T16:23:08","modified_gmt":"2024-11-08T16:23:08","slug":"haconti-cybersecurity-challenges-in-smart-contracts","status":"publish","type":"post","link":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/","title":{"rendered":"HACONTI: Cybersecurity Challenges in Smart Contracts"},"content":{"rendered":"\n<p>By <a href=\"https:\/\/blog.lacnic.net\/en\/author\/juan-schallibaum\/\">Juan Sch\u00e4llibaum<\/a>, Application Security Engineer at Ual\u00e1<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Introduction<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/ethereum.org\/es\/smart-contracts\/\">Smart contracts<\/a> are transforming the way we transact and manage digital assets on the <a href=\"https:\/\/ethereum.org\/es\/what-is-ethereum\/\">Ethereum<\/a> blockchain. However, like any software, they can be vulnerable to security issues. A clear example of this was the 2016 <a href=\"https:\/\/liquidity-provider.com\/es\/articles\/what-was-the-dao-the-story-of-infamous-hack\/\">DAO Hack<\/a>, where an attacker exploited a vulnerability to steal 3.54 million ether, underscoring the importance of having robust security in these contracts.<\/p>\n\n\n\n<p>In this article, we will explore some of the most common vulnerabilities affecting smart contracts. We will also introduce <a href=\"https:\/\/haconti.com\/\">HACONTI<\/a>, a free platform that provides cybersecurity challenges focused on smart contracts. HACONTI is designed to help developers improve the security of their contracts and allow security specialists to learn how to assess these critical systems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>Smart Contract Vulnerabilities<\/strong><\/h2>\n\n\n\n<p>Smart contracts can be affected by multiple types of vulnerabilities. Some of the most critical are included in the list below.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Reentrancy<\/strong>: Allows an attacker to repeatedly call a function again before its previous execution is completed, manipulating the contract.<\/li>\n\n\n\n<li><strong>Integer Overflow<\/strong>: An integer overflow occurs when an arithmetic operation surpasses the fixed range of a type of data, causing unexpected behavior.<\/li>\n\n\n\n<li><strong>Denial of Service (DoS)<\/strong>: A DoS attack can block access to critical functions or deplete the <a href=\"https:\/\/ethereum.org\/es\/developers\/docs\/gas\/\">gas<\/a> of the contract, preventing its proper operation.<\/li>\n\n\n\n<li><strong>Access Control Flaws<\/strong>: These flaws allow unauthorized users to access functions that should be restricted, compromising the system&#8217;s integrity.<\/li>\n\n\n\n<li><strong>Private Information on the Blockchain<\/strong>: As information stored on the blockchain is public, confidentiality can be compromised if it is not properly encrypted.<\/li>\n\n\n\n<li><strong>Insecure Calls to External Contracts<\/strong>: The use of <a href=\"https:\/\/solidity-by-example.org\/delegatecall\/\">delegatecall()<\/a> with untrusted contracts may allow the manipulation of the internal state of the calling contract.<\/li>\n<\/ul>\n\n\n<section class=\"acf-view acf-view--id--21788 acf-view--object-id--27944\"><div class=\"acf-view__texto_fijo acf-view__row\"><div class=\"acf-view__texto_fijo-field acf-view__field\"><div class=\"acf-view__texto_fijo-choice acf-view__choice\">Additional reading:<\/div><\/div><\/div><div class=\"acf-view__enlace acf-view__row\"><div class=\"acf-view__enlace-field acf-view__field\"><a target=\"_self\" class=\"acf-view__enlace-link acf-view__link\" href=\"https:\/\/blog.lacnic.net\/en\/techniques-solutions-and-best-practices-for-mitigating-ddos-attacks\/\">Techniques, Solutions, and Best Practices for Mitigating DDoS Attacks<\/a><\/div><\/div><\/section>\n\n\n<h2 class=\"wp-block-heading\"><a><\/a><strong>HACONTI &#8211; Cybersecurity Challenges<\/strong><\/h2>\n\n\n\n<p><a href=\"https:\/\/haconti.com\/\">HACONTI (short for <em>Hack The Not So Smart Contract<\/em><\/a> in Spanish) is a web platform that offers cybersecurity challenges focusing on <a href=\"https:\/\/soliditylang.org\/\">Solidity<\/a> smart contracts. Each level or challenge presents a smart contract with a vulnerability which users must exploit.<\/p>\n\n\n\n<p>The platform has a total of thirty levels, organized into three different categories, each with its own difficulty level. Two of the most notable features of HACONTI are the extensive contextual information it provides for the vulnerabilities in each level and its unique points system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"497\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-1024x497.png\" alt=\"\" class=\"wp-image-27926\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-1024x497.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-300x146.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-680x330.png 680w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-768x373.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti-1536x745.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig1-haconti.png 1620w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>HACONTI Main Menu<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Challenge Categories<\/strong><strong><\/strong><\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Category 1 (Introductory)<\/strong>: Levels designed so that players without prior experience can become familiar with Ethereum and smart contracts, and acquire basic skills to deploy and interact with Solidity contracts.<br><br><\/li>\n\n\n\n<li><strong>Category 2 (Simple Vulnerabilities)<\/strong>: These levels focus on teaching specific vulnerabilities related to a specific <a href=\"https:\/\/swcregistry.io\/\">Smart Contract Weakness Classification (SWC)<\/a> and\/or <a href=\"https:\/\/github.com\/ComposableSecurity\/SCSVS\">Smart Contract Security Verification Standard (SCSVS)<\/a>.<br><br><\/li>\n\n\n\n<li><strong>Category 3 (Complex and Chained Vulnerabilities)<\/strong>: These more advanced levels combine multiple simple vulnerabilities that must be exploited in sequence to complete the challenge, testing the skills acquired by solving previous levels.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>Contextual Information for the Challenges<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Each level indicates its status (solved or unsolved), difficulty, and category. It also includes a list of objectives that must be overcome and the source code of the vulnerable contract with which one must interact to complete the level.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"642\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti-1024x642.png\" alt=\"\" class=\"wp-image-27929\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti-1024x642.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti-300x188.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti-526x330.png 526w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti-768x482.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig2-haconti.png 1470w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>\u201cReentrance\u201d Level<\/em><\/p>\n\n\n\n<p>Levels in Category 1 also include a detailed tutorial for their resolution. Those in Categories 2 and 3 include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Description<\/strong>: Challenge details.<\/li>\n\n\n\n<li><strong>Hints<\/strong>: Clues that can be unlocked with points.<\/li>\n\n\n\n<li><strong>Additional hints<\/strong>: Clues requiring more points.<\/li>\n\n\n\n<li><strong>SWC and SCSVS<\/strong>: Information about vulnerabilities and associated checklists; can be unlocked with additional points.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"681\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti-1024x681.png\" alt=\"\" class=\"wp-image-27932\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti-1024x681.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti-300x200.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti-496x330.png 496w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti-768x511.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig3-haconti.png 1470w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>\u201cPoints\u201d Level<\/em><\/p>\n\n\n\n<p>Once a level is solved, the following is also unlocked:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Additional Information<\/strong>: Technical details about solving the level.<\/li>\n\n\n\n<li><strong>Real-Life Cases<\/strong>: Examples of real-world incidents where attackers exploited similar vulnerabilities to steal millions of ether.<\/li>\n\n\n\n<li><strong>Fixed Code<\/strong>: Source code that shows how to remediate the vulnerability. multiple versions of the remediation may exist.<\/li>\n\n\n\n<li><strong>Hints<\/strong>, <strong>Additional Hints<\/strong>, and <strong>SWC and SCSVS<\/strong> information associated with the completed level are automatically unlocked regardless of the player\u2019s points.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"805\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti-1024x805.png\" alt=\"\" class=\"wp-image-27935\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti-1024x805.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti-300x236.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti-420x330.png 420w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti-768x604.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig4-haconti.png 1470w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>\u201cBuilderName\u201d Level Unlockable Information<\/em><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><a><\/a><strong>HACONTI Points System<\/strong><strong><\/strong><\/h3>\n\n\n\n<p>Points are earned by solving levels. Points are awarded based on the difficulty of each level:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Very Easy<\/strong>: 50 points<\/li>\n\n\n\n<li><strong>Easy<\/strong>: 100 points<\/li>\n\n\n\n<li><strong>Normal<\/strong>: 150 points<\/li>\n\n\n\n<li><strong>Difficult<\/strong>: 200 points<\/li>\n\n\n\n<li><strong>Very Difficult<\/strong>: 300 points<\/li>\n<\/ul>\n\n\n\n<p>These points allow players to climb the public ranking and are required to unlock hints, additional hints, and vulnerability details (SWC and SCSVS). They can also be used to customize the player&#8217;s profile, for example, to choose a nickname (200 points), choose a flag (500 points), or add contact information such as an email address, website, and social media profiles.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"507\" src=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-1024x507.png\" alt=\"\" class=\"wp-image-27938\" srcset=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-1024x507.png 1024w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-300x149.png 300w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-667x330.png 667w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-768x380.png 768w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti-1536x760.png 1536w, https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/fig5-haconti.png 1612w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>HACONTI Ranking<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Juan Sch\u00e4llibaum, Application Security Engineer at Ual\u00e1 Introduction Smart contracts are transforming the way we transact and manage digital assets on the Ethereum blockchain. However, like any software, they can be vulnerable to security issues. A clear example of this was the 2016 DAO Hack, where an attacker exploited a vulnerability to steal 3.54 [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":27941,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[499],"tags":[1271],"archivo":[1345,1451],"taxonomy-authors":[1530],"tipo_autor":[1455],"class_list":["post-27944","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cibersecurity","archivo-editions","archivo-highlights-2023","taxonomy-authors-juan-schallibaum-en","tipo_autor-colaborador"],"acf":{"author":"Juan Sch\u00e4llibaum","related_notes":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts\" \/>\n<meta property=\"og:description\" content=\"By Juan Sch\u00e4llibaum, Application Security Engineer at Ual\u00e1 Introduction Smart contracts are transforming the way we transact and manage digital assets on the Ethereum blockchain. However, like any software, they can be vulnerable to security issues. A clear example of this was the 2016 DAO Hack, where an attacker exploited a vulnerability to steal 3.54 [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\" \/>\n<meta property=\"og:site_name\" content=\"LACNIC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/lacnic\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-07T18:17:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-08T16:23:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png\" \/>\n\t<meta property=\"og:image:width\" content=\"680\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Gianni\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lacnic\" \/>\n<meta name=\"twitter:site\" content=\"@lacnic\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\"},\"author\":{\"name\":\"Gianni\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\"},\"headline\":\"HACONTI: Cybersecurity Challenges in Smart Contracts\",\"datePublished\":\"2024-11-07T18:17:16+00:00\",\"dateModified\":\"2024-11-08T16:23:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png\",\"keywords\":[\"Cibersecurity\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\",\"url\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\",\"name\":\"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts\",\"isPartOf\":{\"@id\":\"https:\/\/blog.lacnic.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png\",\"datePublished\":\"2024-11-07T18:17:16+00:00\",\"dateModified\":\"2024-11-08T16:23:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png\",\"width\":680,\"height\":330},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\/\/blog.lacnic.net\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"HACONTI: Cybersecurity Challenges in Smart Contracts\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.lacnic.net\/#website\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"name\":\"LACNIC Blog\",\"description\":\"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.\",\"publisher\":{\"@id\":\"https:\/\/blog.lacnic.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.lacnic.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.lacnic.net\/#organization\",\"name\":\"LACNIC Blog\",\"url\":\"https:\/\/blog.lacnic.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"contentUrl\":\"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg\",\"caption\":\"LACNIC Blog\"},\"image\":{\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/lacnic\",\"https:\/\/x.com\/lacnic\",\"https:\/\/www.instagram.com\/lacnic\/?hl=es-la\",\"https:\/\/uy.linkedin.com\/company\/lacnic\",\"https:\/\/www.youtube.com\/user\/lacnicstaff\",\"https:\/\/www.lacnic.net\/podcast\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab\",\"name\":\"Gianni\",\"url\":\"https:\/\/blog.lacnic.net\/en\/author\/gianni\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/","og_locale":"en_US","og_type":"article","og_title":"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts","og_description":"By Juan Sch\u00e4llibaum, Application Security Engineer at Ual\u00e1 Introduction Smart contracts are transforming the way we transact and manage digital assets on the Ethereum blockchain. However, like any software, they can be vulnerable to security issues. A clear example of this was the 2016 DAO Hack, where an attacker exploited a vulnerability to steal 3.54 [&hellip;]","og_url":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/","og_site_name":"LACNIC Blog","article_publisher":"https:\/\/facebook.com\/lacnic","article_published_time":"2024-11-07T18:17:16+00:00","article_modified_time":"2024-11-08T16:23:08+00:00","og_image":[{"width":680,"height":330,"url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","type":"image\/png"}],"author":"Gianni","twitter_card":"summary_large_image","twitter_creator":"@lacnic","twitter_site":"@lacnic","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#article","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/"},"author":{"name":"Gianni","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab"},"headline":"HACONTI: Cybersecurity Challenges in Smart Contracts","datePublished":"2024-11-07T18:17:16+00:00","dateModified":"2024-11-08T16:23:08+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","keywords":["Cibersecurity"],"articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/","url":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/","name":"LACNIC Blog | HACONTI: Cybersecurity Challenges in Smart Contracts","isPartOf":{"@id":"https:\/\/blog.lacnic.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage"},"image":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","datePublished":"2024-11-07T18:17:16+00:00","dateModified":"2024-11-08T16:23:08+00:00","breadcrumb":{"@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#primaryimage","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","width":680,"height":330},{"@type":"BreadcrumbList","@id":"https:\/\/blog.lacnic.net\/en\/haconti-cybersecurity-challenges-in-smart-contracts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/blog.lacnic.net\/en\/"},{"@type":"ListItem","position":2,"name":"HACONTI: Cybersecurity Challenges in Smart Contracts"}]},{"@type":"WebSite","@id":"https:\/\/blog.lacnic.net\/#website","url":"https:\/\/blog.lacnic.net\/","name":"LACNIC Blog","description":"En el Blog de LACNIC encontrar\u00e1s art\u00edculos t\u00e9cnicos vinculados al desarrollo de Internet en la regi\u00f3n de Am\u00e9rica Latina y el Caribe.","publisher":{"@id":"https:\/\/blog.lacnic.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.lacnic.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.lacnic.net\/#organization","name":"LACNIC Blog","url":"https:\/\/blog.lacnic.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","contentUrl":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2023\/03\/lacnic-blog.svg","caption":"LACNIC Blog"},"image":{"@id":"https:\/\/blog.lacnic.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/lacnic","https:\/\/x.com\/lacnic","https:\/\/www.instagram.com\/lacnic\/?hl=es-la","https:\/\/uy.linkedin.com\/company\/lacnic","https:\/\/www.youtube.com\/user\/lacnicstaff","https:\/\/www.lacnic.net\/podcast"]},{"@type":"Person","@id":"https:\/\/blog.lacnic.net\/#\/schema\/person\/1338d9cfdb0137e8bc5581f3771f39ab","name":"Gianni","url":"https:\/\/blog.lacnic.net\/en\/author\/gianni\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2024\/11\/haconti-blog-2024.png","jetpack_sharing_enabled":true,"wpml_current_locale":"en_US","wpml_translations":[{"locale":"es_ES","id":27923,"post_title":"HACONTI: Desaf\u00edos de Ciberseguridad en Smart Contracts","slug":"haconti-desafios-de-ciberseguridad-en-smart-contracts","href":"https:\/\/blog.lacnic.net\/haconti-desafios-de-ciberseguridad-en-smart-contracts\/"},{"locale":"pt_BR","id":27952,"post_title":"HACONTI: Desafios daseguran\u00e7a cibern\u00e9tica\u00a0 em Smart Contracts","slug":"haconti-desafios-daseguranca-cibernetica-em-smart-contracts","href":"https:\/\/blog.lacnic.net\/pt-br\/haconti-desafios-daseguranca-cibernetica-em-smart-contracts\/"}],"_links":{"self":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27944","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/comments?post=27944"}],"version-history":[{"count":5,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27944\/revisions"}],"predecessor-version":[{"id":27966,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/posts\/27944\/revisions\/27966"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media\/27941"}],"wp:attachment":[{"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/media?parent=27944"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/categories?post=27944"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tags?post=27944"},{"taxonomy":"archivo","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/archivo?post=27944"},{"taxonomy":"taxonomy-authors","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/taxonomy-authors?post=27944"},{"taxonomy":"tipo_autor","embeddable":true,"href":"https:\/\/blog.lacnic.net\/en\/wp-json\/wp\/v2\/tipo_autor?post=27944"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}