RareSkillsThe Transparent Upgradeable Proxy Pattern Explained in DetailThe Transparent Upgradeable Proxy is a design pattern for upgrading a proxy while eliminating the possibility of a function selector clash.Aug 22Aug 22
RareSkillsinRareSkillsFixed Point Arithmetic in Solidity (Using Solady, Solmate, and ABDK as Examples)A fixed-point number is an integer that stores only the numerator of a fraction — while the denominator is implied.Aug 10Aug 10
RareSkillsinRareSkillsSolidity Coding StandardsThe purpose of this article is not to rehash the official Solidity Style Guide, which you should read. Rather, it is to document the common…Aug 3Aug 3
RareSkillsinRareSkillsThe interest rate model of AAVE V3 and Compound V2Interest rates in TradFi (traditional finance) are largely determined by central banks and influenced by market factors. In contrast, DeFi…Jul 27Jul 27
RareSkillsinRareSkillsERC-1363 Standard ExplainedERC-1363 enables a smart contract to detect and respond to an incoming transfer of tokens.Jul 20Jul 20
RareSkillsinRareSkillsUnderstanding the Function Selector in SolidityThe function selector is a 4 byte id that Solidity uses to identify functions under the hood.Jul 13Jul 13
RareSkillsinRareSkillsDelegatecall: The Detailed and Animated GuideThis article explains how delegatecall works in detail. The Ethereum Virtual Machine (EVM) offers four opcodes for making calls between…Jun 29Jun 29
RareSkillsinRareSkillsThe second preimage attack for Merkle Trees in SolidityThe second preimage attack in Merkle trees can happen when an intermediate node in a merkle tree is presented as a leaf.Jun 24Jun 24
RareSkillsinRareSkillsAn Animated Tutorial of the MD5 Hash FunctionWe’ve created an animated explainer that shows how the MD5 hash function works step-by-step. You can see visually what happens at each…Jun 20Jun 20
RareSkillsinRareSkillsThree ways to detect if an address is a smart contractThis article describes three methods in Solidity for determining if an address is a smart contract:Jun 18Jun 18