Deconstructing a Solidity Contract — Part VI: The Metadata Hash
In the last article, we noticed that the runtime bytecode generated by the Solidity compiler...
Announcing Defender 2.0 General Availability: our mission-critical security and automation platform.Read the blog
In the last article, we noticed that the runtime bytecode generated by the Solidity compiler...
The function body is precisely what the function wrappers detour to, after unpacking the incoming...
In the last article, we saw how the function selector acts as a hub or a switch of sorts in our...
The Transaction Permission Layer protocol (TPL) is a method for assigning metadata (herein referred...
William Hinman’s recent statements at the Yahoo Finance All Markets Summit provide some guidance...
In the previous article, we identified the need to separate a contract’s bytecode into...
ZeppelinOS is all about making the technology of upgradeability into an accessible and frictionless...
Let’s get started by attacking the disassembled gibberish of our contract with our...
You’re on the road, driving fast in your rare, fully restored 1969 Mustang Mach 1. The sunlight...
Blockchains are immutable, and Ethereum is no exception. Ethereum has a rich smart contracts...
The Dharma team asked us to review and audit the smart contracts implementing their protocol. We...
Welcome to the second part of this guide. If you haven’t read part 1, I highly recommend it to...