Nattawat SongsomPrice Inflation Attack in DeFi VaultsHow attackers gain control of the liquidity.Oct 21, 2024Oct 21, 2024
merlinboiiDeployment to Defense Security Strategies for Blockchain ProtocolsTo ensure your protocol remains secure, it’s crucial to establish a comprehensive security plan for pre- and post-deployment.Oct 9, 2024Oct 9, 2024
Anak MirasingHow Shift-Left Approach Enhances Smart Contract SecurityLearn how early integration of security practices like the Shift-Left approach creates safer smart contracts.Oct 4, 2024Oct 4, 2024
Kritsada DechawattanaEIP7702: Closing the Gap Between EOAs and Smart ContractsWhy is EIP-7702, despite being recently created, included in the next Ethereum upgrade?Sep 27, 2024Sep 27, 2024
Nattawat SongsomFuzz testing with EchidnaLet’s break a smart contract in random waysJul 9, 2024Jul 9, 2024
Nattawat SongsomNextGen Smart Contract BreakdownUnraveling the code by identifying its purposeNov 27, 2023Nov 27, 2023
merlinboiiBreakdown of Rollups — Layer 2 Scaling SolutionRollups, currently stand out as the most influential scaling solution implemented in Ethereum.Nov 6, 2023Nov 6, 2023
Kritsada DechawattanaUpgradeable Smart ContractWhen a smart contract is immutable why could be upgradeable?Oct 31, 2023Oct 31, 2023
Anak MirasingFriend.tech Smart Contract BreakdownWe’re here to breakdown exactly how the Friend.tech smart contract operates.Oct 5, 2023A response icon1Oct 5, 2023A response icon1