MEV attacks happen when someone usually a miner, validator, or bot manipulates the order of pending transactions in Ethereum EVM chains to make extra money
This attaclk is done by front-running, back-running, sandwich or liquidation attacks
mempoo...
Decentralized File Storage
Decentralized file storage refers to systems that use distributed networks of computers nodes to store data securely and redundantly, rather than relying on centralized servers.
These systems use blockchain or peer-to-p...
Private variables on EVM blockchains are not really private and hidden
Do you think storing important keys and data in private key's are safer on EVM chains. Definition say's all, EVM is an transparent chain
Attackers will always looks for deploye...
Oracles: Simple Introduction
Oracles are external data providers that bring off-chain data to on-chain smart contracts!!!!
DeFi protocols with Liquidity Pools are considered as oracles -> Such as Uniswap, Sushiswap, etc.
DeFi protocols, who rely...
EVM compatible, opcodes and calling
The EVM basically represents all the instructions a computer needs to be able to read.
Any language that can compile down to bytecode with these opcodes is considered EVM compatible'
1. Data in Transactions:
...
Storage layout and array overflow/underflow risks!!!!
Solidity stores data in Each slot = 32 bytes 256 bits
Each storage slot is numbered: slot 0, slot 1, slot 2 and so on.
Solidity tries to pack variables into these slots efficiently, but the ac...
Blockchain Devops
Blockchain DevOps involves the application of DevOps principles and practices in the blockchain ecosystem. It focuses on streamlining the development, deployment, testing, and operation of blockchain-based applications or network...