0xdeadcode ~upd~ ✮
"Dead code" isn't harmless — it’s a backdoor waiting to be activated.
Don't bury code. Delete it.
Dead code is a time bomb. Diffuse it. Title: 0xdeadcode — The Living Dead in Your Bytecode 0xdeadcode
When you compile a Solidity contract, the optimizer doesn't just remove unreachable paths — it buries them. But "unreachable" at compile time is not "unreachable at runtime" if the EVM state can change.
Then I traced the JUMPDEST that should be unreachable — but a storage collision could reanimate it. "Dead code" isn't harmless — it’s a backdoor
(thread-style) 2. A short blog/forum post exploring a "dead code" vulnerability in smart contracts 1. X (Twitter) Post by @0xdeadcode Main post: 0xdeadcode
One storage write to flip the false to true later, and pause becomes owner-only backdoor. Dead code is a time bomb
Result: "Dead code" becomes a self-destruct backdoor after a storage collision.