A review guarantees that the security of the Ethereum platform can be at risk due to the non-discriminatory copying of intelligent contracts.
According to the published report, There are very few variations in the origin of intelligent contracts.This means that all weaknesses in contracts are reproduced thousands of times.
judicial "Investigation of the Topology of Eteryum Contracts"Research by Luciana Kiffer and Alan Mislo of Northeastern University and Dave Levin of the University of Maryland examined how smart contracts are formed and how Ethereum users interact with each other. This discovery revealed that most of the intelligent contracts in the network were directed towards ç direct copies os or os very close in contracts that support the ecosystem's important cryptocurrency.
According to Kiffer, Mislo and Levin who worked on a decentralized network I Etherea”Reuse of code er is a risky practice, because due to the kullanıl less variety uygulam in contracts, Copying them may have duplicated code errors. To achieve this result, researchers have used a modified version of the Ethereum client, where they analyzed the five million block chains of the network's operations since its inception in 2015.
125.177 intelligent contracts were analyzed between these five million blocks. The report revealed more than that. 100,000 contracts come from only 16,373 clusters. Similarly, researchers found that 51.1% of the contracts analyzed were from the first 5 clusters or groups; 26.143 is the number one in charge of the coin contract, and the second consists of "October 2016" contracts in the DDoS attack.
In addition to the "reuse of important code", the results of the interactions recorded in the geth client, known as the EtherEum Virtual Machine, reveal that the contracts are now "three times more than the creation by users of other contracts". and 60% of them are never "associated". On the other hand, the percentage of user-created contracts reaches almost 10 percent.