Prajwal MoreA look into transient storage’s possible security and coding mistakes.Table of contents: 1. What is Transient storage (in short) 2. Applications of transient storage (in short) 3. Usage with examples 4…6 min read·May 2, 2024----
Prajwal MoreUnderstanding and exploiting reentrancy while safeMint()-ing NFTs._safeMint() is sometime not safe when used without taking care, this article shows identifying and exploiting reentrancy with POC…3 min read·Jul 5, 2022--1--1
Prajwal MoreTracing smart contract transaction calls, and events locally with hardhat-tracer | QuillAuditsHave you ever noticed a need of tracing smart contract transactions while testing or learning smart contract protocols or forks?5 min read·May 5, 2022--1--1
Prajwal MoreHacking vulnerable smart contract: CTF by ciphershastra.comLets take a look of how to exploit vulnerable smart contract.8 min read·Jun 27, 2021----