Prajwal MoreA look into transient storage’s possible security and coding mistakes.Table of contents: 1. What is Transient storage (in short) 2. Applications of transient storage (in short) 3. Usage with examples 4…May 2May 2
Prajwal MoreUnderstanding and exploiting reentrancy while safeMint()-ing NFTs._safeMint() is sometime not safe when used without taking care, this article shows identifying and exploiting reentrancy with POC…Jul 5, 20221Jul 5, 20221
Prajwal MoreTracing smart contract transaction calls, and events locally with hardhat-tracer | QuillAuditsHave you ever noticed a need of tracing smart contract transactions while testing or learning smart contract protocols or forks?May 5, 20221May 5, 20221
Prajwal MoreHacking vulnerable smart contract: CTF by ciphershastra.comLets take a look of how to exploit vulnerable smart contract.Jun 27, 2021Jun 27, 2021