Morayo AkranERC4337: Deep DiveEthereum recently upgraded its software, enabling the abstraction of accounts. A feature that will make it 10x easier to onboard more usersApr 15, 2023Apr 15, 2023
Morayo AkranOracles- The bridge between real world data and blockchainSmart contracts, despite the name aren’t inherently smart. They are chunks of code which reside on a blockchain network waiting to be…Aug 13, 2022Aug 13, 2022
Morayo AkranDelegatecall() VulnerabilityDelegatecall() is a function used within solidity to activate the code of another contract. In this blog we explore its weaknesses.Jul 30, 2022Jul 30, 2022
Morayo AkranStateless vs Stateful Smart ContractsThere exists two types of smart contracts that have differing usages and advantages. Stateless smart contracts refer to contracts that are…Jul 24, 2022Jul 24, 2022
Morayo AkranAn insight into Front-RunningA delve into front-running, how it works, the methods and most importantly how to protect yourself!Jul 12, 2022Jul 12, 2022
Morayo AkranA Guide to Re-entrancy AttacksRe-entrancy is a smart contract vulnerability within Solidity, that grants an attacker the ability to drain a smart contract of its funds…Jun 25, 2022Jun 25, 2022
Morayo AkranCrywareCryware is a series of techniques targeting cryptocurrency users, the term was coined by Microsoft in May 2022.Jun 10, 2022Jun 10, 2022
Morayo AkranAxie Infinity Hack ExplainedOn 23rd March 2022, Ronin Bridge part of the popular NFT game Axie Infinity was compromised. It took the developers Sky Mavis 6 days to…May 22, 2022May 22, 2022