RareSkillsinRareSkillsThe second preimage attack for Merkle Trees in SolidityThe second preimage attack in Merkle trees can happen when an intermediate node in a merkle tree is presented as a leaf.Just nowJust now
RareSkillsinRareSkillsAn Animated Tutorial of the MD5 Hash FunctionWe’ve created an animated explainer that shows how the MD5 hash function works step-by-step. You can see visually what happens at each…4d ago4d ago
RareSkillsinRareSkillsThree ways to detect if an address is a smart contractThis article describes three methods in Solidity for determining if an address is a smart contract:5d ago5d ago
RareSkillsinRareSkillsDeFi Lending: Liquidations and CollateralIn TradFi, when someone defaults on a loan, the creditor has the right to seize assets or garnish wages.Jun 5Jun 5
RareSkillsinRareSkillsFlash Loans and how to hack them: a walk through of ERC-3156Flash loans are loans between smart contracts that must be repaid in the same transaction. This article describes the ERC 3156 flash loan…May 27May 27
RareSkillsinRareSkillsHow ERC721 Enumerable WorksAn Enumerable ERC721 is an ERC721 with added functionality that enables a smart contract to list all the NFTs an address owns. This article…May 20May 20
RareSkillsinRareSkillsThe Staking Algorithm of Sushiswap MasterChef and SynthetixThe MasterChef and Synthetix staking algorithms distribute a fixed reward pool among stakers according to their time-weighted contributions…May 17May 17
RareSkillsinRareSkillsUniswap V2: Calculating the Settlement Price of an AMM SwapThis article explains how to determine the price settlement of a trading pair in an Automated Market Maker (AMM). It answers the question…May 14May 14