Зарегистрироваться

0xdeadcode |link| May 2026

(thread-style) 2. A short blog/forum post exploring a "dead code" vulnerability in smart contracts 1. X (Twitter) Post by @0xdeadcode Main post: 0xdeadcode

"Dead code" isn't harmless — it’s a backdoor waiting to be activated. 0xdeadcode

Then I traced the JUMPDEST that should be unreachable — but a storage collision could reanimate it. (thread-style) 2

Since "0xdeadcode" evokes low-level programming, EVM (Ethereum Virtual Machine) internals, security exploits, and perhaps a bit of rebellious cypherpunk energy, I'll write two versions: EVM (Ethereum Virtual Machine) internals

I recently dissected a contract that had this:

Result: "Dead code" becomes a self-destruct backdoor after a storage collision.