Sign up to get on our Private Beta List and earn a spot to win upto 100,000 AQUA Token
In this function a malicious user will be able to extract several times his own Ether balance from the contract before updating the internal balance of that user. Which means, stealing all the funds of the bank in one function call.
AI identifies vulnerability, will parse through a search space to find a test suite of solutions to show the developer. The developer will pick one and the AI will automatically modify the source with the patch.
Set the balance of the user to 0 and then send the corresponding Ether balance using the more secure function `msg.sender.transfer()`. That way the balance of the user will be zero when you try to extract it again from the same function call.
We intend on initially focusing on Haskell and Solidity written Smart Contracts. We will eventually start training with other languages to start catering to all security vulnerabilities.See more examples
Launching first Solidity version onto the Test Network.
Haskell version onto the Test Network.
Launch Product on Product Hunt.
Partnered with EtherDelta, ForkDelta and IDEX. (Partnering with: Bittrex, KuCoin, Huobi, HitBTC).
Continue training from incoming data of testnet.
Launch both languages (Solidity and Haskell) on Mainnet.
Partner with major Financial/Legal institutions to pilot with our Product
17,000 users in 30 Days.
Presented at TiE Boston, Harvard iLab, & MIT Media Lab.
Piloted with 3 teams in Bay Area.
Funding from Execs at Boston Private Bank, Rogers Corporation, and MIT Media Lab.
Fully Funded Private Sale.
April 23rd - May 1st
10,000,000 tokens with 80% bonus.
2000 ETH or $0.20
May 1st to June 1st
May 1st - June 1st
12,000,000 tokens with 50% bonus.
6000 ETH or $0.50
June 1st to July 1st
12,500,000 tokens with 20% bonus.
10, 000 ETH or $0.80