Examples of canonical, cross-function, cross-contract, and read-only attacks. How YOU can mitigate them.