https://github.com/hellwolf/popsicle-exploit
Using various tools to rediscover popsicle exploit
https://github.com/hellwolf/popsicle-exploit
Last synced: 7 months ago
JSON representation
Using various tools to rediscover popsicle exploit
- Host: GitHub
- URL: https://github.com/hellwolf/popsicle-exploit
- Owner: hellwolf
- Created: 2022-02-28T09:18:40.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2022-03-10T16:20:39.000Z (almost 4 years ago)
- Last Synced: 2025-07-02T13:05:35.288Z (7 months ago)
- Language: Solidity
- Homepage:
- Size: 27.3 KB
- Stars: 15
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# Motivation
Following the tutorials from [Certora](https://www.certora.com/) about [Popsicle Finance
Exploit](https://github.com/Certora/Tutorials/blob/master/08.Lesson_WorkingWithInvariants/WritingRules/PopsicleFinance/),
it is an interesting exercise to try out if we could reproduce the same exploit using
[dapptool](https://github.com/dapphub/dapptools/) and [echidna](https://github.com/crytic/echidna).