 
      
    | You are here | ventral.digital | ||
| | | | | y4y.space | |
| | | | | Resources Challenge site: https://www.damnvulnerabledefi.xyz/ Foundry version of challenge: https://github.com/StErMi/forge-damn-vulnerable-defi Original, hardhat version of challenge: https://github.com/tinchoabbate/damn-vulnerable-defi Prerequisite Originally I wanted to put all the source and explain each line of code. Then I realized it would take really long to complete the notes/write-up. So I decided I would just talk about the key points in each... | |
| | | | | eips.ethereum.org | |
| | | | | A consistent location where proxies store the address of the logic contract they delegate to, as well as other proxy-specific information. | |
| | | | | blog.openzeppelin.com | |
| | | | | The UMA team asked us to review and audit their Across Token and Token Distributor repository. The system is composed of the Across token (ACX) and the Across token distributor. | |
| | | | | www.cybereason.com | |
| | | In this high-stakes game of cat and mouse, the use of artificial intelligence (AI) has emerged as a powerful tool in the fight against cyber threats. | ||