-
Notifications
You must be signed in to change notification settings - Fork 15
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
659a05a
commit 07649ad
Showing
1 changed file
with
28 additions
and
1 deletion.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,28 @@ | ||
# Token Security Benchmark | ||
# Token Security Benchmark (TSB) | ||
|
||
The `token-security-benchmark` is a comprehensive repository aimed at identifying and cataloging scams like honeypots, and intentional backdoors that may be present in token smart contracts within the crypto ecosystem. This benchmark serves as: | ||
|
||
- **A Shield against Malicious Contracts:** By showcasing a defined list of malicious token contract patterns, it empowers users and project teams to recognize and steer clear of contracts with hidden intents, thereby ensuring safer interactions within the decentralized space. | ||
|
||
- **A Testing Ground for Developers:** With a clear classification of malicious patterns and real-world examples, developers creating tools to detect these malicious token smart contracts can effectively evaluate their systems against a standardized benchmark. | ||
|
||
- **A Catalyst for Research:** By elucidating the deceitful practices adopted in token smart contracts, we aspire to drive more research towards crypto user safety, encouraging the community to devise strategies that deter such behaviors. | ||
|
||
- **An Educational Asset:** This repository stands as an initiative to amplify awareness, serving as an informational reservoir, shedding light on potential contract pitfalls and deceitful patterns to the advantage of the community. | ||
|
||
## Features | ||
|
||
- **Descriptions:** Each pattern is thoroughly dissected, detailing its operation, potential consequences, and techniques for avoidance. | ||
- **Real-world Samples:** For each pattern, contract samples that exemplify the described malicious intent are provided, forming a practical point of reference. | ||
|
||
## How to Contribute | ||
|
||
Maintaining the relevance and comprehensiveness of this repository is a joint endeavor. We earnestly welcome community contributions. For details on how to contribute, kindly refer to our [Contribution Guidelines](./CONTRIBUTING.md). | ||
|
||
## Acknowledgments | ||
|
||
Our profound gratitude to all developers, researchers, and crypto enthusiasts who have been instrumental in shaping this repository. We hope to collaboratively fortify crypto user security and invite everyone to join this collective endeavor. | ||
|
||
## License | ||
|
||
This repository is distributed under the Apache License, Version 2.0. For more specifics, please review our [LICENSE](./LICENSE) file. |