ManmeetTop 28 DeFi attack vectorsFlash Loan Attacks: Flash loan attacks involve taking advantage of the ability to borrow and manipulate large sums of assets within a…Jun 13, 20231Jun 13, 20231
ManmeetExploring Singleton Contracts in Smart Contract DevelopmentIntroductionJun 13, 2023Jun 13, 2023
ManmeetEIP-1153: Enhancing Efficiency with Transient Storage OpcodesIntroduction: Ethereum Improvement Proposal 1153 (EIP-1153) presents a significant advancement in optimizing transaction execution on the…Jun 13, 2023Jun 13, 2023
ManmeetERC-6551Before ERC-6551, there were several challenges and limitations in the management and ownership of tokens (NFTs) within token-based…Jun 9, 2023Jun 9, 2023
ManmeetHow Ethereum’s immutable smart contract can be upgradedEthereum, as a decentralised blockchain platform, follows the principle of immutability for its smart contracts. Immutability refers to the…May 25, 2023May 25, 2023
ManmeetERC-4626In this article, we are going to discuss the ERC-4626. To understand this first we need to know, What is the need of ERC-4626?May 22, 20231May 22, 20231
ManmeetViolent attack vectors in WEB3In today’s time WEB3 (blockchain) is something that is continuously growing and building trust over millions of users. Main reason for…May 12, 2023May 12, 2023
ManmeetDeep dive into solidity opcodeWhen we go deep down into the solidity smart contract we get information about the bytecode opcode hashes and many more things.May 4, 2023May 4, 2023
ManmeetEIP-2535 (Diamond Pattern) ArchitectureBefore Understanding the architecture of the Diamond pattern first we need to understand what is a diamond pattern. Why is it introduced?May 4, 2023May 4, 2023