Patrick CollinsinCyfrinWhat can the EVM do, actually?This article was originally written on the Cyfrin blog.1d ago
RareSkillsinRareSkillsFlash Loans and how to hack them: a walk through of ERC-3156Flash loans are loans between smart contracts that must be repaid in the same transaction. This article describes the ERC 3156 flash loan…May 271
RareSkillsinRareSkillsUnderstanding the Function Selector in SolidityThe function selector is a 4 byte id that Solidity uses to identify functions under the hood.13h ago13h ago
Solid QuantHow I spend my days Mempool watching (Part 1): Transaction Prediction through EVM TracingHow I started from bird watching to mempool watching, and how I’m building my sandwich bot nowJul 31, 20235Jul 31, 20235
DecimalChainDecimal blockchain migration newsThe Decimal project continues to work on the big task of migrating blockchain operations from the COSMOS module to the EVM module. A lot of…1d ago1d ago
Patrick CollinsinCyfrinWhat can the EVM do, actually?This article was originally written on the Cyfrin blog.1d ago
RareSkillsinRareSkillsFlash Loans and how to hack them: a walk through of ERC-3156Flash loans are loans between smart contracts that must be repaid in the same transaction. This article describes the ERC 3156 flash loan…May 271
RareSkillsinRareSkillsUnderstanding the Function Selector in SolidityThe function selector is a 4 byte id that Solidity uses to identify functions under the hood.13h ago
Solid QuantHow I spend my days Mempool watching (Part 1): Transaction Prediction through EVM TracingHow I started from bird watching to mempool watching, and how I’m building my sandwich bot nowJul 31, 20235
DecimalChainDecimal blockchain migration newsThe Decimal project continues to work on the big task of migrating blockchain operations from the COSMOS module to the EVM module. A lot of…1d ago
Solid QuantREVM Is All You NeedHow to build simulated blockchain realities (and rule that world)Sep 11, 202310
Mayowa Olatunji (@web3MIO)Short Address Attack ExplainedA Short Address Attack is a vulnerability that exploits the way some third-party applications or interfaces handle address parameters when…2d ago
Patrick GasselininSwissBorg EngineeringArbitrum Stylus vs. Solidity: Performance BenchmarkI — ContextMay 11