Security in EVM Chain: Reconnaissance, Attacks, and Mitigation

Security in EVM Chain: Reconnaissance, Attacks, and Mitigation


6 min read

The Ethereum network, powered by the Ethereum Virtual Machine (EVM) and Solidity - the network's primary programming language - has rapidly emerged as a leading platform for smart contracts and decentralized applications (dApps). Despite the innovative potential of these technologies, they are not devoid of security pitfalls.

This article delves into the nature of security issues in the EVM chain and Solidity, methods for identifying vulnerabilities (reconnaissance), and examples of how attacks might be executed. The aim is to equip developers and security professionals with the knowledge to protect their applications and contracts from malicious actors.

1. Introduction to EVM and Solidity

The Ethereum Virtual Machine (EVM) is the runtime environment for smart contracts in Ethereum. It is completely isolated from the mainnet, which means that code running inside the EVM has no access to the network, file system, or other processes.

Solidity, on the other hand, is a statically typed programming language designed for developing smart contracts that run on the EVM. Solidity's syntax is similar to JavaScript, making it relatively easy to learn for developers familiar with the latter.

2. Security Concerns in EVM and Solidity

While EVM and Solidity have established themselves as fundamental building blocks of the Ethereum network, they also introduce unique security issues. Some common vulnerabilities include:

2.1 Reentrancy Attacks

Reentrancy attacks are perhaps the most infamous security vulnerability in Ethereum, primarily due to the DAO exploit in 2016 where around $50M was stolen. In a reentrancy attack, an attacker can repeatedly call a function in a contract, draining its Ether before it has a chance to update its state.

2.2 Arithmetic Overflows and Underflows

Solidity prior to version 0.8.0 does not handle arithmetic overflows and underflows, which can lead to unexpected behavior. If a number becomes too big (overflows) or too small (underflows), it wraps around to an unexpected value.

2.3 Gas Limit and Loops

Infinite loops can lead to a contract becoming "stuck" if it consume more gas than is available in a block. Additionally, if gas costs are not properly accounted for, they can be manipulated for DoS attacks.

2.4 Delegatecall

The delegatecall function in Solidity can introduce serious security issues if not handled with care. It allows a contract to "borrow" code from another contract while maintaining the context of the calling contract.

3. Reconnaissance and Attack Techniques

Identifying vulnerabilities in EVM and Solidity requires knowledge of these potential attack vectors, as well as the ability to inspect and interact with smart contracts.

3.1 Reconnaissance

One of the first steps in identifying vulnerabilities is to review the contract's source code. If the contract is verified on Etherscan, the code can be found on the contract's page under the Contract tab. Developers can also use tools like Mythril, Slither, and Securify to automatically analyze Solidity code for common vulnerabilities.

3.2 Performing Attacks

Once potential vulnerabilities are identified, an attacker might try to exploit them. Here are examples of how some of these attacks might be carried out:

3.2.1 Reentrancy Attack

Consider a contract with a withdraw function that sends Ether before updating the user's balance:

function withdraw(uint amount) public {
    require(balances[msg.sender] >= amount);
    (bool success, ) ={value: amount}("");
    balances[msg.sender] -= amount;

An attacker could create a contract that calls the withdraw function in its fallback function:

contract Attacker {
    Target target;

    constructor(Target _target) {
        target = _target;

    fallback() external payable {
        if (address(target).balance >= 1 ether) {
            target.withdraw(1 ether);

    function attack() external payable {
        target.deposit{value: 1 ether}();
        target.withdraw(1 ether);

In this example, the attack function deposits 1 Ether and then requests a withdrawal. When the withdraw function is called, it triggers the fallback function in the Attacker contract, which requests another withdrawal before the balance is updated.

3.2.2 Overflow and Underflow

Consider a contract that uses a token balance:

contract VulnerableToken {
    mapping(address => uint) public balances;

    function transfer(address to, uint value) public {
        require(balances[msg.sender] >= value);
        balances[msg.sender] -= value;
        balances[to] += value;

If the value of the transfer is greater than the sender's balance (underflow), the require statement will pass and the sender's balance will wrap around to a very large value.

Moreover, if the recipient's balance is very high (close to the maximum value of uint), additional tokens could cause an overflow, resetting the balance to a very low value.

A malicious actor could exploit these vulnerabilities to generate a virtually unlimited number of tokens or drain another user's tokens.

3.2.3 Gas Limit and Loops

Consider a contract that iterates over an array:

contract VulnerableLoop {
    address[] public participants;

    function join() public payable {
        require(msg.value == 1 ether);

    function distribute() public {
        uint payout = address(this).balance / participants.length;
        for (uint i = 0; i < participants.length; i++) {
            (bool success, ) = participants[i].call{value: payout}("");

In this example, if the array becomes too large, the distribute function could exceed the block gas limit, making the Ether stuck in the contract. An attacker could exploit this to make the contract's funds unobtainable.

3.2.4 Delegatecall

Consider a contract that uses delegatecall:

contract DelegatecallVulnerable {
    address public implementation;

    function setImplementation(address _implementation) public {
        implementation = _implementation;

    fallback() external {
        address impl = implementation;
        require(impl != address(0));
        assembly {
            let ptr := mload(0x40)
            calldatacopy(ptr, 0, calldatasize())
            let result := delegatecall(gas(), impl, ptr, calldatasize(), 0, 0)
            let size := returndatasize()
            returndatacopy(ptr, 0, size)
            switch result
            case 0 { revert(ptr, size) }
            default { return(ptr, size) }

In this contract, an attacker could set the implementation address to a contract they control. The attacker's contract could then manipulate the storage of the vulnerable contract, potentially stealing funds or causing other unwanted behavior.

4. Mitigation Techniques

While the security challenges in EVM and Solidity are significant, they are not insurmountable. Developers can employ various mitigation techniques to secure their smart contracts:

4.1 Use Updated Compiler Version

Always use the latest stable version of the Solidity compiler. New versions often include security fixes and new features that make writing secure contracts easier.

4.2 Use Safe Math Libraries

Libraries like OpenZeppelin's SafeMath provide safe arithmetic operations that protect against overflows and underflows.

4.3 Limit Gas Forwarded in Calls

Limit the amount of gas forwarded in .call() to prevent DoS attacks.

4.4 Use Checks-Effects-Interactions Pattern

This pattern recommends that you first perform checks (like require statements), then make any state changes, and finally interact with other contracts.

4.5 Use Modifiers to Check Conditions

Modifiers can be applied to functions to change their behavior. They can be used to check preconditions before a function is executed.

4.6 Use Events for Monitoring Activity

Events allow light clients to react to changes efficiently. They can be used to monitor contract activity.

4.7 Regular Audits

Regular audits by security professionals can help identify and fix vulnerabilities.

5. Conclusion

Security in the EVM chain and Solidity is a challenging yet vital aspect of smart contract development. Understanding potential vulnerabilities, as well as reconnaissance and attack techniques, is crucial for any developer in the space. By applying mitigation techniques and best practices, we can create a more secure Ethereum ecosystem.

Did you find this article valuable?

Support Laxman Rai by becoming a sponsor. Any amount is appreciated!