A look into transient storage’s possible security and coding mistakes.Table of contents: 1. What is Transient storage (in short) 2. Applications of transient storage (in short) 3. Usage with examples 4…May 2, 2024May 2, 2024
Understanding and exploiting reentrancy while safeMint()-ing NFTs._safeMint() is sometime not safe when used without taking care, this article shows identifying and exploiting reentrancy with POC…Jul 5, 20221Jul 5, 20221
Tracing smart contract transaction calls, and events locally with hardhat-tracer | QuillAuditsHave you ever noticed a need of tracing smart contract transactions while testing or learning smart contract protocols or forks?May 5, 20221May 5, 20221
Hacking vulnerable smart contract: CTF by ciphershastra.comLets take a look of how to exploit vulnerable smart contract.Jun 27, 2021Jun 27, 2021