Beginner Roadmap to Smart Contract Auditing

00:28:31
https://www.youtube.com/watch?v=-469Gcye-ZE

Ringkasan

TLDRIn this video, the presenter discusses a beginner roadmap for smart contract auditing and his experiences in web3 security. Sharing personal insights, he highlights learning resources, including Capture The Flag (CTF) challenges, Solidity tutorials, and bug bounty platforms such as Code Arena and Immunefi. He emphasizes the potential for newcomers to make meaningful progress, backed by real monetary rewards, and encourages building a solid understanding through reading past audit reports and participating in contests. The presenter shares his journey over the past two months, underscoring the lucrative opportunities available in the web3 security space for those willing to engage and learn.

Takeaways

  • πŸ‘©β€πŸ’» Learning web3 security has a wealth of opportunities.
  • πŸ’° Code Arena offers lucrative bug bounty rewards.
  • πŸ“š Utilize various resources like CTFs and tutorials to learn.
  • πŸ” Reading past audit reports is crucial for understanding vulnerabilities.
  • πŸ† 'Try harder' mentality is essential for learning and progress.
  • πŸ“ˆ Newcomers can achieve significant payouts within months.
  • πŸ‘¨β€πŸŽ“ Familiarize yourself with both Solidity and DeFi basics.
  • 🀝 Participate in contests for hands-on experience.
  • πŸ“– Review findings from multiple perspectives to deepen understanding.
  • πŸš€ The web3 security field is not as saturated as traditional bug bounties.

Garis waktu

  • 00:00:00 - 00:05:00

    The speaker welcomes viewers to their smart contract auditing beginner roadmap video, expressing their intention to share learning resources and personal experiences in web3 security, particularly from participating in bug bounty contests on Code Arena. They emphasize that progress is possible in the web3 space and highlight numerous opportunities for newcomers.

  • 00:05:00 - 00:10:00

    The speaker introduces their background as a penetration tester in traditional cybersecurity and shares insights on how their experiences led to recent successes in web3 bug bounties. They discuss the mentalities that helped them learn, including the importance of being comfortable with feeling challenged. The mention of other bug bounty platforms like Immunefi showcases the lucrative incentives present in the web3 space, where recent payouts have reached up to $10 million.

  • 00:10:00 - 00:15:00

    Moving to Code Arena, a distinctive bug bounty platform that operates as an audit contest, the speaker describes how participants can earn findings through various severity levels, with most contests attracting fewer participants, enhancing earning potential. The unique characteristics and public transparency of reports offer a valuable feedback cycle for improving skills, particularly beneficial for new entrants into web3 security.

  • 00:15:00 - 00:20:00

    Learning resources play a crucial role, and the speaker recommends engaging with capture the flags (CTFs) to grasp Solidity and DeFi basics. They provide a list of essential CTFs such as Damn Vulnerable DeFi and Capture the Ether alongside tutorial recommendations on Solidity, emphasizing a balanced approach between structured learning and hands-on challenges for skill enhancement.

  • 00:20:00 - 00:28:31

    After sharing their personal journey through initial QA and optimization reports, the speaker elaborates on evolving to identify medium and high severity findings, justifying the effectiveness of studying previous audit reports and leveraging insights from others in the community. They express intentions to keep climbing the leaderboard, improve their knowledge, and contribute resources to assist others looking to advance in web3 security.

Tampilkan lebih banyak

Peta Pikiran

Video Tanya Jawab

  • What is the focus of this video?

    The video focuses on providing a beginner's roadmap for smart contract auditing and web3 security.

  • What resources did the presenter find helpful?

    The presenter mentions several resources, including CTFs (Capture The Flag challenges), Solidity tutorials by Patrick Collins, and educational sites like teachyourselfcrypto.com.

  • What are Code Arena and Immunefi?

    Code Arena is a platform that hosts audit contests for web3 projects, while Immunefi is a bug bounty platform offering substantial rewards for vulnerability discoveries.

  • What kind of payouts can participants expect?

    Participants in web3 bug bounty programs, specifically Code Arena, can earn payouts ranging from low thousands to tens of thousands based on the severity of the findings.

  • How did the presenter’s prior experience help in web3 security?

    The presenter has a background in penetration testing within traditional cybersecurity, which helped build foundational skills relevant to web3 security.

  • What mindset is essential when learning web3 auditing?

    A 'try harder' mentality and being comfortable with feeling dumb while learning new concepts are vital for progress.

  • What is the importance of reading past audit reports?

    Reading past audit reports helps participants understand previous findings, build knowledge of vulnerabilities, and improve their own auditing skills.

  • What are the prospects for new participants in web3 security?

    New participants have ample opportunities to find vulnerabilities and earn rewards, as the field is less saturated compared to traditional bug bounty platforms.

  • Can you summarize the learning process for Solidity?

    The learning process involves participating in CTFs, completing Solidity tutorials, understanding DeFi basics, and reviewing security pitfalls and best practices.

  • Is it worthwhile to invest time in learning this space?

    Yes, the presenter illustrates that with dedication, newcomers can achieve significant progress and monetary rewards in a relatively short time.

Lihat lebih banyak ringkasan video

Dapatkan akses instan ke ringkasan video YouTube gratis yang didukung oleh AI!
Teks
en
Gulir Otomatis:
  • 00:00:00
    hello hello welcome to my smart contract
  • 00:00:03
    auditing beginner roadmap video where
  • 00:00:06
    i'll be going over some of the learning
  • 00:00:08
    resources i used and i'll talk about
  • 00:00:11
    some of my experiences as well in the
  • 00:00:14
    web3 bug bounty space
  • 00:00:16
    now i am pretty new to web3 security but
  • 00:00:19
    i have recently made some good progress
  • 00:00:22
    from participating in order contests on
  • 00:00:25
    code arena so i thought it would be a
  • 00:00:28
    good time to share some of that
  • 00:00:29
    experience and i think it'll be valuable
  • 00:00:32
    for those who are new to the space to
  • 00:00:35
    hear this from someone who's also
  • 00:00:37
    relatively new just to give that
  • 00:00:40
    perspective and more importantly give
  • 00:00:42
    hope to those people
  • 00:00:44
    who want to
  • 00:00:45
    start participating in this i let them
  • 00:00:47
    know that this is possible to make
  • 00:00:49
    progress there is a lot of opportunity
  • 00:00:51
    here
  • 00:00:52
    and
  • 00:00:53
    i think it'll become obvious as i go
  • 00:00:56
    over some of the various opportunities
  • 00:00:59
    and
  • 00:01:00
    the things that are available for you if
  • 00:01:03
    you want to get into web3 security
  • 00:01:06
    just a bit of background about myself i
  • 00:01:09
    am a penetration tester in traditional
  • 00:01:11
    cyber security so my day-to-day is
  • 00:01:13
    performing network and web application
  • 00:01:16
    penetration tests and writing reports
  • 00:01:20
    so internal external network penetration
  • 00:01:23
    tests a web application penetration
  • 00:01:26
    tests those are sort of the bread and
  • 00:01:29
    butter of what i do day to day
  • 00:01:32
    i do understand
  • 00:01:34
    a little bit about the crypto space but
  • 00:01:36
    nothing substantial before this and i
  • 00:01:39
    have not looked into web3 security
  • 00:01:42
    before starting this
  • 00:01:45
    i did get my oscp last year in case
  • 00:01:47
    someone asks if the oscp was helpful
  • 00:01:51
    now the most helpful thing was probably
  • 00:01:53
    the try harder mentality
  • 00:01:56
    i hate to say it but being comfortable
  • 00:01:58
    with feeling dumb is
  • 00:02:01
    probably something that
  • 00:02:03
    is very helpful when learning something
  • 00:02:05
    new
  • 00:02:07
    and that mindset did help
  • 00:02:09
    for me when going through some of the
  • 00:02:11
    learning resources and reading reports
  • 00:02:14
    that i didn't quite understand yet
  • 00:02:17
    so i've been on code arena for two
  • 00:02:19
    months and recently got my biggest
  • 00:02:21
    payout on the platform for a high
  • 00:02:23
    severity finding which was worth 3k
  • 00:02:26
    and i'm currently ranked 36 on the 60
  • 00:02:30
    day leaderboard with in total
  • 00:02:33
    two high severity findings and one
  • 00:02:36
    medium severity finding
  • 00:02:38
    now before i talk about the coder in the
  • 00:02:40
    stuff i'll just quickly mention there is
  • 00:02:43
    also another bug bounty platform in web
  • 00:02:45
    3 which is a munifi and they are
  • 00:02:48
    offering some very massive bounties up
  • 00:02:51
    to the 10 million for
  • 00:02:53
    wormhole and maker dow
  • 00:02:56
    and some of these bounties have actually
  • 00:02:58
    been paid out recently so just a couple
  • 00:03:02
    of months ago the wormhole
  • 00:03:04
    bug bounty paid out for 10 million
  • 00:03:06
    dollars based on an uninitialized proxy
  • 00:03:09
    issue i mean if you read this report
  • 00:03:12
    it's just like are you serious 10
  • 00:03:14
    million for this i mean
  • 00:03:16
    this is pretty much straight out of a
  • 00:03:18
    ctf and
  • 00:03:20
    this is as bad as leaving default creds
  • 00:03:25
    on something exposed to the internet
  • 00:03:27
    like it's just that bad and
  • 00:03:29
    relatively simple to find
  • 00:03:32
    something like this paying out 10
  • 00:03:34
    million
  • 00:03:35
    it kind of goes to show that there's
  • 00:03:37
    just not that many eyeballs in this
  • 00:03:39
    space and there's a lot of opportunity
  • 00:03:41
    to be had right
  • 00:03:43
    and also this one which happened just
  • 00:03:45
    two weeks ago
  • 00:03:47
    which is aurora labs paying out 6
  • 00:03:49
    million these are some record-breaking
  • 00:03:52
    bug bounty rewards and there's no way
  • 00:03:55
    that you'll be able to find these type
  • 00:03:57
    of rewards in the traditional bug bounty
  • 00:04:00
    space where even places like zorodium if
  • 00:04:03
    you want to go gray hat and you sell
  • 00:04:05
    zero days from microsoft you only get
  • 00:04:08
    around 1 million for those zero days
  • 00:04:11
    which i'm pretty sure is way harder to
  • 00:04:14
    find compared to bugs in the web 3 space
  • 00:04:17
    so code arena is a pretty unique way to
  • 00:04:21
    do bug bounties where it's not strictly
  • 00:04:24
    a bug bounty platform they call it an
  • 00:04:27
    audit contest so how that works is a
  • 00:04:30
    contest will run between three to seven
  • 00:04:33
    days for example and there will be a
  • 00:04:36
    fixed price
  • 00:04:37
    usually the prices are between 30k to
  • 00:04:40
    around 100k and by the end of that one
  • 00:04:43
    week period the full prize is guaranteed
  • 00:04:46
    to be paid out
  • 00:04:48
    to all the participants who submitted
  • 00:04:51
    findings during that
  • 00:04:53
    order contest
  • 00:04:55
    now the prizes are
  • 00:04:57
    shared between the findings that you
  • 00:04:59
    submit so if you submitted high severity
  • 00:05:02
    findings you get a bigger share of the
  • 00:05:04
    prize pool
  • 00:05:05
    compared to mediums and lows
  • 00:05:08
    and you also get payouts
  • 00:05:10
    if your submission is a duplicate so
  • 00:05:14
    essentially when a duplicate happens you
  • 00:05:17
    just get a share of the price that is
  • 00:05:20
    allocated to that particular finding
  • 00:05:23
    overall there is less competition on
  • 00:05:26
    code arena
  • 00:05:27
    i mean honestly it feels like almost
  • 00:05:30
    every round is like a very lucrative
  • 00:05:32
    private bug bounty program there are
  • 00:05:34
    only about 200 participants on code
  • 00:05:37
    arena who have ever received the prize
  • 00:05:39
    off it and every competition usually we
  • 00:05:43
    get about 30 to 60 participants at the
  • 00:05:46
    moment now last year it was even less
  • 00:05:48
    people usually around 10 people per
  • 00:05:51
    contest so last year people were really
  • 00:05:53
    raking it in
  • 00:05:54
    on code arena
  • 00:05:56
    every competition is mostly based on a
  • 00:05:59
    new project so you're pretty much
  • 00:06:01
    looking at a fresh code base so you're
  • 00:06:04
    almost guaranteed to find something on
  • 00:06:07
    every competition which is great for
  • 00:06:09
    people who are new into the space where
  • 00:06:11
    if you're looking at a traditional bug
  • 00:06:13
    bounty it's extremely hard to find
  • 00:06:15
    anything and when you actually find
  • 00:06:17
    something it's probably a duplicate
  • 00:06:19
    finding so fresh code base every
  • 00:06:22
    competition is really great for people
  • 00:06:25
    who are new in the space and i mean you
  • 00:06:27
    get paid for duplicates so you're almost
  • 00:06:29
    guaranteed to get paid out even if you
  • 00:06:32
    are new
  • 00:06:34
    and the final good thing about code
  • 00:06:35
    arena is all reports are public so you
  • 00:06:38
    get that feedback loop where you can see
  • 00:06:42
    all the findings that other people
  • 00:06:43
    submitted once the report is published
  • 00:06:46
    you can review those reports and
  • 00:06:49
    continuously improve your process
  • 00:06:53
    so you can start finding those bugs that
  • 00:06:55
    you missed as well
  • 00:06:57
    so it kind of looks like this
  • 00:06:59
    currently there are two competitions
  • 00:07:01
    running at this time both of those were
  • 00:07:03
    i think three-day competitions
  • 00:07:06
    and paying around 50 000
  • 00:07:09
    recently the amount of contests have
  • 00:07:12
    been going up on kotorina as well
  • 00:07:14
    sometimes the most i've seen is five
  • 00:07:17
    contests running at the same time with
  • 00:07:19
    hundreds of thousands of dollars in each
  • 00:07:21
    of these contests
  • 00:07:23
    so for me the learning resources i used
  • 00:07:26
    were based on this a very good blog post
  • 00:07:29
    by c michelle on his blog how to become
  • 00:07:33
    a smart contract auditor he published
  • 00:07:36
    this post sometime last year and based
  • 00:07:39
    on that there was a big influx of people
  • 00:07:42
    who came to code arena so this is sort
  • 00:07:45
    of the
  • 00:07:46
    rough guideline of how i
  • 00:07:49
    approached uh learning this material
  • 00:07:52
    he's currently ranked one on the
  • 00:07:54
    all-time leader board with 1.1 million
  • 00:07:56
    in awards and he's been doing this for
  • 00:07:59
    about just over a year full time
  • 00:08:02
    i did see he made another blog post
  • 00:08:04
    recently where he documented the hourly
  • 00:08:07
    rate he was getting on code arena when
  • 00:08:10
    he first started last year when there
  • 00:08:13
    was less competition even less than now
  • 00:08:15
    he was getting about three thousand
  • 00:08:17
    dollars an hour and currently
  • 00:08:19
    it's hovering around five hundred
  • 00:08:21
    dollars an hour so based on that blog
  • 00:08:24
    post the main areas of focus for
  • 00:08:26
    auditing smart contracts is learning
  • 00:08:29
    about the solidity language learning
  • 00:08:31
    about d5 basics and also traditional
  • 00:08:34
    finance basics so i'll go over some of
  • 00:08:38
    the learning resources for each
  • 00:08:40
    for solidity i would recommend people
  • 00:08:43
    who are familiar with ctfs to go through
  • 00:08:46
    these ctfs first to learn about the
  • 00:08:49
    language and get your feet wet in this
  • 00:08:52
    space so there are essentially three
  • 00:08:54
    main ctfs available they are damn
  • 00:08:57
    vulnerable defy the etho naught
  • 00:09:00
    challenges and also capture the ether
  • 00:09:03
    for me i looked at damn vulnerable d5
  • 00:09:06
    first because that was just the first
  • 00:09:08
    one i saw someone post on twitter which
  • 00:09:10
    got me interested in the space
  • 00:09:12
    but i would actually recommend people do
  • 00:09:16
    the ethernet challenges first because
  • 00:09:19
    that's probably the easier of the three
  • 00:09:22
    to get started with and there are plenty
  • 00:09:25
    of video walkthroughs of the ethernet
  • 00:09:28
    challenges
  • 00:09:29
    one i would recommend is a d squared so
  • 00:09:33
    he has all the ethernet challenge levels
  • 00:09:36
    1 to 26 on his youtube channel they're
  • 00:09:39
    all about 20 to 30 minutes long so very
  • 00:09:42
    detailed walkthroughs he also talks
  • 00:09:44
    about his learning process as he does
  • 00:09:47
    the challenges as well so that's really
  • 00:09:49
    great for the beginner
  • 00:09:51
    capture the ether is around the same
  • 00:09:53
    level of difficulty as the ethernet
  • 00:09:56
    challenges i actually haven't done
  • 00:09:57
    capture the ether i just briefly looked
  • 00:10:00
    at it and saw that it did have a lot of
  • 00:10:02
    overlap between ethernet challenges so i
  • 00:10:05
    didn't actually go through capture the
  • 00:10:06
    ether challenges but that's definitely
  • 00:10:08
    one you can look into as well and
  • 00:10:10
    finally there's the damn vulnerable d5
  • 00:10:13
    challenge
  • 00:10:14
    which is probably the hardest of the
  • 00:10:16
    three i did most of the challenges and
  • 00:10:19
    damn vulnerable d5 but i didn't finish
  • 00:10:22
    them i don't think it's necessary for
  • 00:10:24
    you to do all the challenges but just
  • 00:10:26
    enough to
  • 00:10:28
    get your feet wet and
  • 00:10:30
    start to understand some of the
  • 00:10:33
    vulnerabilities in solidity
  • 00:10:36
    so the next thing i would recommend is
  • 00:10:38
    going through a solidity tutorial if
  • 00:10:41
    you're not very familiar with the
  • 00:10:42
    language i actually switched back and
  • 00:10:44
    forth between doing the tutorial and
  • 00:10:47
    also doing the ctf challenges because i
  • 00:10:50
    found that was very helpful in
  • 00:10:53
    first understanding something and then
  • 00:10:55
    applying it in the ctf so a great
  • 00:10:58
    solidity tutorial you can go through is
  • 00:11:00
    the one by patrick collins on free code
  • 00:11:03
    camp you can find the full videos on
  • 00:11:05
    youtube
  • 00:11:06
    he released a python version earlier
  • 00:11:10
    this year based on the brownie framework
  • 00:11:13
    and recently he just uploaded a
  • 00:11:15
    javascript framework version of that as
  • 00:11:18
    well using hard hat and that one is over
  • 00:11:22
    30 hours long so plenty of material to
  • 00:11:25
    go through
  • 00:11:26
    now you don't need to go through
  • 00:11:29
    all of the course if you are just
  • 00:11:32
    interested in the security aspects i
  • 00:11:34
    think it's best for you to
  • 00:11:37
    just get enough to understand the
  • 00:11:39
    language
  • 00:11:41
    to finish the ctf challenges
  • 00:11:44
    and then after that you can always refer
  • 00:11:46
    back to
  • 00:11:48
    the tutorial if you don't understand
  • 00:11:50
    something you don't want to be trapped
  • 00:11:52
    in tutorial hell here just
  • 00:11:54
    go through
  • 00:11:56
    obtain the various pieces of information
  • 00:11:58
    you need to complete your challenges and
  • 00:12:00
    then move on and then use this as a
  • 00:12:02
    reference point later on when you find
  • 00:12:05
    you don't understand a particular
  • 00:12:06
    concept
  • 00:12:08
    so for d5 basics a link that i saw
  • 00:12:11
    shared around a lot is teach yourself
  • 00:12:14
    crypto dot com
  • 00:12:16
    the blog post from c michelle mentions
  • 00:12:18
    these five points to understand from d5
  • 00:12:22
    which are token contracts proxies master
  • 00:12:26
    chef a compound and uni swap version two
  • 00:12:30
    so teach yourself crypto pretty much
  • 00:12:32
    covers these topics
  • 00:12:34
    not to a very high
  • 00:12:36
    technical detail but to the level where
  • 00:12:39
    if you're not familiar with d5
  • 00:12:42
    and then it'll pretty much get you up to
  • 00:12:44
    speed on what the use case is what is it
  • 00:12:47
    actually trying to do
  • 00:12:49
    how the system is designed and so forth
  • 00:12:51
    because previously when i first got into
  • 00:12:54
    code arena and i was looking at
  • 00:12:57
    the solidity code sometimes i just
  • 00:12:59
    didn't even know what the hell i was
  • 00:13:01
    looking at because i didn't understand
  • 00:13:03
    the d5 basics of what the code was
  • 00:13:05
    actually trying to do so at least get
  • 00:13:08
    yourself familiar with these
  • 00:13:11
    five main points of d5 for token
  • 00:13:14
    contracts you would also
  • 00:13:16
    encounter them during ctfs and the free
  • 00:13:19
    code camp
  • 00:13:21
    solidity
  • 00:13:22
    tutorial for proxies you will also
  • 00:13:25
    encounter them in ctfs for the
  • 00:13:28
    masterchef algorithm i would recommend
  • 00:13:30
    you watching the synthetic staking
  • 00:13:33
    rewards contract explain video on
  • 00:13:35
    youtube this video is made by the smart
  • 00:13:38
    contract programmer you can just search
  • 00:13:40
    that title on youtube and you'll find
  • 00:13:42
    that video series that'll pretty much
  • 00:13:44
    explain the math behind
  • 00:13:47
    the master chef contract and staking
  • 00:13:49
    rewards which is pretty hard to
  • 00:13:51
    understand if you
  • 00:13:53
    are not
  • 00:13:54
    that into math anymore which probably
  • 00:13:58
    most of us aren't
  • 00:13:59
    and finally for the finance basics the
  • 00:14:03
    khan academy course is a good option to
  • 00:14:06
    learn about traditional finance concepts
  • 00:14:09
    now for me i won't be able to give too
  • 00:14:12
    much of a perspective on this because i
  • 00:14:14
    actually came from a finance background
  • 00:14:16
    before i moved to it so i don't know how
  • 00:14:19
    much of that experience has actually
  • 00:14:21
    helped me in the course of auditing
  • 00:14:24
    solidity and smart contracts but i did
  • 00:14:26
    briefly look at this course and it does
  • 00:14:28
    seem like a good course that's gonna
  • 00:14:30
    pretty much cover most of the points
  • 00:14:32
    that you need to understand now the
  • 00:14:35
    course is pretty long so i wouldn't
  • 00:14:37
    recommend just
  • 00:14:39
    doing all this in one go again same as
  • 00:14:43
    the solidity tutorial use this as a
  • 00:14:46
    reference point to
  • 00:14:48
    reference back to it rather than just
  • 00:14:50
    viewing it all in one setting and then
  • 00:14:52
    pretty much forgetting about it once
  • 00:14:53
    you're done with the course
  • 00:14:55
    so after that your training is done and
  • 00:14:58
    you'll want to start to apply what you
  • 00:15:01
    have learned in actual audit contests
  • 00:15:05
    and reading previous audit reports to
  • 00:15:08
    understand the findings that other
  • 00:15:09
    people have found and just slowly build
  • 00:15:12
    up that mental mind map of the various
  • 00:15:16
    vulnerabilities that you may encounter
  • 00:15:19
    a great resource for actually getting
  • 00:15:21
    into order findings is securium so
  • 00:15:24
    securium has a website where they have
  • 00:15:28
    various blog posts where they talk about
  • 00:15:30
    ethereum 101 solidity 101 security
  • 00:15:33
    pitfalls and best practices all the
  • 00:15:36
    techniques and audit findings the most
  • 00:15:39
    useful material i found on securium was
  • 00:15:43
    the audit findings 101 and 102 which got
  • 00:15:46
    me used to starting to read and
  • 00:15:49
    understand past audit reports and start
  • 00:15:53
    to digest some of this
  • 00:15:56
    knowledge that
  • 00:15:57
    was from the previous learning resources
  • 00:16:01
    again shout out to d squared here where
  • 00:16:03
    he documented his journey going through
  • 00:16:06
    the securium material if you find the
  • 00:16:08
    securing materials a bit dry to read
  • 00:16:11
    through i would definitely recommend
  • 00:16:13
    watching these squares videos and then
  • 00:16:15
    going back to reading the securium
  • 00:16:17
    findings
  • 00:16:19
    and finally after you've gone through
  • 00:16:21
    all that you can start reading the
  • 00:16:23
    previous audit reports on code arena so
  • 00:16:27
    a couple of tricks i used to understand
  • 00:16:30
    these previous audit reports when i
  • 00:16:31
    first started reading them is go through
  • 00:16:34
    the low risk and non-critical issues
  • 00:16:37
    findings first on those reports because
  • 00:16:39
    those are very easy to understand even
  • 00:16:42
    if you are very new and starting to
  • 00:16:45
    understand those findings first will get
  • 00:16:48
    you into
  • 00:16:50
    participating in contests and start that
  • 00:16:53
    positive feedback loop where you are
  • 00:16:55
    continuously reading reports and
  • 00:16:58
    applying what you learned in order
  • 00:17:00
    contests
  • 00:17:02
    the next thing you want to do is try to
  • 00:17:04
    understand the high and medium severity
  • 00:17:07
    findings that are duplicate reports so
  • 00:17:10
    essentially what that means is find
  • 00:17:12
    those findings where you see a bunch of
  • 00:17:16
    different wardens have also found them
  • 00:17:18
    then go to that
  • 00:17:20
    particular github repo and pull out the
  • 00:17:23
    other wardens findings and start to
  • 00:17:26
    review those
  • 00:17:28
    findings from multiple wardens point of
  • 00:17:30
    view because sometimes if you read a
  • 00:17:32
    finding if you don't quite understand it
  • 00:17:34
    that warden probably didn't describe it
  • 00:17:37
    in a way that resonated with you so
  • 00:17:39
    viewing the findings from different
  • 00:17:41
    writers really helped to paint a clearer
  • 00:17:43
    picture to
  • 00:17:45
    what that finding actually is and i
  • 00:17:47
    found it really helped when
  • 00:17:49
    the
  • 00:17:50
    finding that was in the final report
  • 00:17:52
    didn't make sense but other wardens
  • 00:17:54
    provided a better explanation for that
  • 00:17:57
    particular finding
  • 00:17:59
    and finally you will go to the high and
  • 00:18:02
    medium findings that are unique findings
  • 00:18:05
    so this is pretty much the ultimate goal
  • 00:18:07
    when you're participating in code arena
  • 00:18:09
    is start to find unique high and medium
  • 00:18:12
    findings yourself and the first step in
  • 00:18:15
    doing that is understanding all those
  • 00:18:18
    unique findings in the previous order
  • 00:18:21
    reports now this is pretty much still an
  • 00:18:23
    ongoing process for me in my last video
  • 00:18:26
    i mentioned
  • 00:18:27
    i pretty much understood all the reports
  • 00:18:30
    now which is actually not true that i
  • 00:18:33
    came to find out recently because i did
  • 00:18:35
    encounter some findings where i just
  • 00:18:37
    really couldn't get my head around so
  • 00:18:39
    this is still an ongoing process for me
  • 00:18:42
    to understand these high and medium
  • 00:18:44
    unique findings so this is sort of my
  • 00:18:47
    progress on code arena so far for the
  • 00:18:50
    first two months
  • 00:18:52
    when i first started on code arena i was
  • 00:18:55
    only submitting qa and gas optimization
  • 00:18:58
    reports for my first five to ten order
  • 00:19:00
    contest
  • 00:19:01
    during this time i was going through
  • 00:19:04
    some of the learning resources i
  • 00:19:07
    mentioned previously reading past audit
  • 00:19:09
    reports
  • 00:19:11
    and slowly building up that
  • 00:19:13
    knowledge of previous
  • 00:19:16
    findings and after two to three weeks of
  • 00:19:19
    this i started to notice
  • 00:19:22
    some medium severity issues when i am
  • 00:19:24
    just looking through the code now i
  • 00:19:27
    would just mention that
  • 00:19:28
    for submitting qa and gas optimization
  • 00:19:31
    reports you may be tempted to run an
  • 00:19:34
    automated tool such as slither or just
  • 00:19:37
    grab out the various points of interest
  • 00:19:40
    and only submitting those for the qa and
  • 00:19:43
    gas optimizations but
  • 00:19:45
    i would recommend against it so i
  • 00:19:48
    started off by doing that running
  • 00:19:49
    automated tools and then just submitting
  • 00:19:52
    those as my findings for the order
  • 00:19:54
    competitions but i found that it was
  • 00:19:57
    more helpful to actually read the code
  • 00:20:00
    manually yourself
  • 00:20:02
    not because that is actually going to be
  • 00:20:04
    better for you to find more
  • 00:20:06
    qa or gas optimization findings but
  • 00:20:09
    reading more code and just literally
  • 00:20:11
    like parsing it with your eyes is very
  • 00:20:15
    good in terms of getting more used to
  • 00:20:18
    reading solidity and the various
  • 00:20:20
    patterns it uses
  • 00:20:22
    so you
  • 00:20:23
    once you start to read more previous
  • 00:20:26
    audit reports you'll literally start to
  • 00:20:28
    pick up on these patterns during
  • 00:20:31
    reading through the code so the purpose
  • 00:20:34
    of reading through the code is one to
  • 00:20:36
    find these qa and gas optimization
  • 00:20:39
    issues and second of all once you are
  • 00:20:42
    more familiar with the previous
  • 00:20:45
    audit findings you'll be able to pick up
  • 00:20:47
    on these patterns and actually slowly
  • 00:20:51
    see where these potential medium
  • 00:20:53
    severity findings are which is what i
  • 00:20:56
    found
  • 00:20:57
    happened after about two to three weeks
  • 00:20:59
    i started to see some of these potential
  • 00:21:02
    medium severity issues as i was looking
  • 00:21:04
    for qa issues and that was when i
  • 00:21:08
    started submitting medium severity
  • 00:21:10
    issues
  • 00:21:11
    and after one month i got my first
  • 00:21:13
    medium severity issue confirmed and that
  • 00:21:16
    was for a payout of 290 or so dollars
  • 00:21:20
    so i pretty much just repeated that
  • 00:21:22
    process
  • 00:21:24
    kept reading more audit reports and
  • 00:21:27
    participating in
  • 00:21:29
    order contests until about 1.5 months i
  • 00:21:34
    started to see some potential pathways
  • 00:21:36
    for high severity findings
  • 00:21:39
    and i got my high severity finding
  • 00:21:42
    confirmed recently
  • 00:21:44
    and that was amazingly a 3k payout so
  • 00:21:49
    super happy with the progress that i've
  • 00:21:51
    made in just two months on this platform
  • 00:21:54
    i'm honestly pretty surprised
  • 00:21:57
    you know for someone who is
  • 00:22:00
    pretty new to this uh to be able to
  • 00:22:04
    get on the leaderboard and get a high
  • 00:22:07
    severity finding payout for this much
  • 00:22:09
    just in two months so it kind of goes to
  • 00:22:13
    show that the level of competition in
  • 00:22:15
    web 3 bounties is not as high as a
  • 00:22:19
    traditional bug bounty platforms because
  • 00:22:23
    in terms of skill
  • 00:22:25
    i mean i would probably rate my
  • 00:22:28
    web app and network penetration skills
  • 00:22:31
    higher than my solidity auditing skills
  • 00:22:34
    at the moment because just from the
  • 00:22:37
    amount of time that i spent
  • 00:22:39
    in traditional penetration tests right
  • 00:22:42
    but however i think if i tried my hand
  • 00:22:45
    at a traditional bug bounty platform i
  • 00:22:49
    doubt i would be able to get the kind of
  • 00:22:52
    payouts that i am getting now um in web
  • 00:22:55
    3 instead
  • 00:22:57
    so my future goals on code arena i want
  • 00:23:00
    to read all the past audit reports from
  • 00:23:03
    code arena so they have about a hundred
  • 00:23:06
    reports and i've gone through about 30
  • 00:23:08
    to 40 of those reports already so i want
  • 00:23:12
    to finish reading all of those reports
  • 00:23:14
    in the next couple of months
  • 00:23:17
    i want to understand and categorize all
  • 00:23:20
    the findings so in a previous video i
  • 00:23:22
    showed how i categorized the securium
  • 00:23:26
    findings they had 200 of them
  • 00:23:29
    categorizing them into your
  • 00:23:31
    notes
  • 00:23:32
    to into buckets that are similar
  • 00:23:35
    sort of groupings of vulnerabilities
  • 00:23:38
    that really helped me understand
  • 00:23:40
    the securium findings and also for these
  • 00:23:43
    code arena findings i've started to
  • 00:23:46
    notice patterns like i'll go over some
  • 00:23:48
    findings in previous videos and once my
  • 00:23:53
    high level severity finding report
  • 00:23:54
    actually gets published i'll talk more
  • 00:23:56
    findings then but
  • 00:23:58
    pretty much i have started to see
  • 00:24:01
    patterns where a similar findings happen
  • 00:24:04
    very frequently in code arena contest so
  • 00:24:08
    those are the findings that i am
  • 00:24:10
    more focused on because you're more
  • 00:24:12
    likely to find them and they're easier
  • 00:24:14
    to spot based on all the previous
  • 00:24:17
    examples of vulnerable code that you can
  • 00:24:20
    see in the previous order reports
  • 00:24:23
    and
  • 00:24:24
    i also want to spend more time per audit
  • 00:24:27
    contest right so at the moment i am
  • 00:24:31
    devoting more time in reading these
  • 00:24:34
    audit reports and learning rather than
  • 00:24:37
    spending time per order contest so i'm
  • 00:24:40
    potentially still leaving a lot of money
  • 00:24:43
    on the table at this point
  • 00:24:45
    just in terms of
  • 00:24:47
    i'm not spending that much time on the
  • 00:24:49
    contest itself i'm trying to sort of
  • 00:24:51
    blitz through the contest just to snipe
  • 00:24:54
    all the low-hanging fruit issues that i
  • 00:24:57
    can find
  • 00:24:58
    very quickly and i want to spend more
  • 00:25:01
    time that i can devote into this
  • 00:25:04
    on reading previous order reports which
  • 00:25:06
    i feel that is going to be
  • 00:25:09
    providing me more value down the road
  • 00:25:12
    and finding more unique high severity
  • 00:25:15
    and medium findings
  • 00:25:17
    and also keep climbing the leaderboard
  • 00:25:20
    currently i am about 5k and rewards and
  • 00:25:23
    30-something on the 60-day leaderboard i
  • 00:25:26
    want to keep climbing the leaderboard
  • 00:25:28
    and see how far i can push this
  • 00:25:31
    it's a pretty fun side project that i'm
  • 00:25:33
    doing and yeah it's interesting and
  • 00:25:36
    pretty motivating to be
  • 00:25:38
    getting these payouts and finally i want
  • 00:25:41
    to share all my findings and experience
  • 00:25:44
    on this youtube channel of my progress
  • 00:25:47
    on code arena
  • 00:25:49
    i think it's going to really help a lot
  • 00:25:51
    of people um get into the space and just
  • 00:25:54
    leave a trail of breadcrumbs for people
  • 00:25:58
    who
  • 00:25:59
    want to up their skills in the web3
  • 00:26:03
    security space and
  • 00:26:05
    yeah get a share of
  • 00:26:07
    the opportunity that is out there
  • 00:26:11
    now to close this off a bit of
  • 00:26:12
    motivation so this is a shout out to dr
  • 00:26:15
    v who is relatively new into this field
  • 00:26:19
    and he has been making some massive
  • 00:26:21
    progress and really props to him to
  • 00:26:24
    getting where he is today
  • 00:26:26
    so you can see he posted this on the
  • 00:26:29
    code arena discord in february 2022.
  • 00:26:33
    he's been in kodarina for one month and
  • 00:26:36
    he's already on the leaderboard with 4.5
  • 00:26:39
    k
  • 00:26:40
    and just four months previous to that he
  • 00:26:43
    was pretty much zero knowledge in
  • 00:26:46
    smart contracts and a solidity so this
  • 00:26:49
    is to show that it is possible to make a
  • 00:26:53
    really quick progress in this field it's
  • 00:26:55
    not just me i'm pretty surprised at how
  • 00:26:58
    fast i've been able to climb the
  • 00:27:00
    leaderboard on code arena and
  • 00:27:02
    you know other people are doing it too
  • 00:27:04
    so this is just a bit of motivation for
  • 00:27:07
    people who
  • 00:27:09
    want to get in and
  • 00:27:11
    unsure
  • 00:27:12
    of whether they can so you can see the
  • 00:27:15
    potential opportunity here to
  • 00:27:17
    climb the leaderboard pretty quickly and
  • 00:27:20
    sort of make a name for yourself in web3
  • 00:27:22
    security
  • 00:27:23
    and where is drivi now he is 10th on the
  • 00:27:28
    leaderboard with 69k paid out this year
  • 00:27:31
    so big props to him and hope this is a
  • 00:27:35
    motivation for people who are new to the
  • 00:27:38
    space it definitely motivated me as well
  • 00:27:41
    just to see someone has done it in the
  • 00:27:44
    past and they've done it with a relative
  • 00:27:47
    quickness so there it is examples of
  • 00:27:50
    people being pretty successful in this
  • 00:27:53
    field in a relatively short period of
  • 00:27:55
    time
  • 00:27:57
    so to close this off i am happy to
  • 00:28:00
    answer any questions in the comments
  • 00:28:02
    down below
  • 00:28:03
    i do look forward to providing you guys
  • 00:28:06
    with more update on my progress on code
  • 00:28:08
    arena on this channel so subscribe if
  • 00:28:11
    you want to see more videos on this
  • 00:28:14
    so yeah that's it hope to see you guys
  • 00:28:17
    in the arena
  • 00:28:18
    reach out if you have any questions when
  • 00:28:21
    you're going through any of the learning
  • 00:28:23
    resources i mentioned do share your own
  • 00:28:25
    experience as well
  • 00:28:27
    and i'll see you in the next video
Tags
  • Web3
  • Smart Contract
  • Auditing
  • Bug Bounty
  • Code Arena
  • Immunefi
  • Learning Resources
  • Security
  • Solidity
  • CTF