Archive Blogs

Recent Posts

blog cover
Blockchain

Protecting Your Solidity Smart Contract from Block Timestamp Manipulation

Solidity is a powerful programming language used to write smart contracts on blockchain platforms like Ethereum. However, just like any other programming language, it has its vulnerabilities. One such vulnerability is block timestamp manipulation, which can be exploited by attackers to manipulate the timestamp of a block in order to compromise the integrity of a […]
photo of the creator2
blog cover
Blockchain

Bypass Solidity Contract Size Check

In this post we will be talking about Bypass contract size check. Certain smart contract methods, for security reasons, are defined to only accept being called from external owned accounts (EOA) and not from other smart contracts. In order to achieve this, some developers may opt to include, in those methods, a require statement to […]
photo of the creator2
blog cover
Blockchain

Understanding ERC Standards: A Guide to Different Types of Blockchain Tokens

In Ethereum, ERCs are analogous to RFCs. It turns out that lot of the more popular EIPs (Ethereum Improvement Proposals) and ERCs are related to tokens. This has resulted in standards that have shaped how tokens are created, managed, and traded on the Ethereum blockchain. The most popular of these standards are ERC-20, ERC-721, ERC-777, […]
photo of the creator2
blog cover
Bitcoin

Understanding Blockchain Layers: A Comprehensive Guide

Blockchain represents a major innovation in terms of how information is stored and transferred. The simplest way to picture it is as a shared, immutable, decentralized and distributed ledger that stores and keeps track of transaction records. It is built upon layers in which each layer has a unique functionality that ,together, make blockchain a […]
photo of the creator2
blog cover
Blockchain

How Blockchain is Revolutionizing the Gaming Industry

As the world becomes increasingly digitalized, it’s no surprise that the gaming industry has seen a shift towards online and mobile platforms. However, with this shift come new challenges, such as security concerns, trust issues, and limited possibilities for players. Blockchain technology is emerging as a solution to these challenges and is revolutionizing the gaming […]
photo of the creator2
blog cover
Blockchain

Web3.js vs Ethers.js: Picking the Right Ethereum Library for Your DApp

Developing decentralized applications (DApps) on the Ethereum platform requires using powerful libraries to interact with the blockchain. Web3.js and Ethers.js are the two most popular choices for this purpose. In this extensive guide, we will compare Web3.js vs Ethers.js, discuss their core features, provide code examples, and explore their strengths and weaknesses to help you […]
photo of the creator2
blog cover
Blockchain

Unit testing on solidity and test Coverage

Solidity is a programming language designed for developing smart contracts that run on the Ethereum Virtual Machine (EVM). Smart contracts, once deployed into a certain address, cannot always be updated. Hence, rigorously testing it is crucial before deploying them to the chosen network. It is important to have in mind that a single mistake could […]
photo of the creator2
blog cover
Blockchain

Blockchain en Abstracta Tech Talks: conceptos básicos y características

Como parte de la octava temporada de Abstracta Tech Talks, se dará un episodio completo a un tema que despierta la curiosidad de cada vez más personas en la actualidad, Blockchain, con los aportes del Alejando Narancio de Infuy como invitado exclusivo. ¿Cuáles son los desafíos del testing ante esta nueva tecnología? Nos sumergiremos con Alejandro […]
photo of the creator2
blog cover
Blockchain

Design Patterns for Smart Contracts

Smart contract design patterns are essential to building secure and efficient blockchain applications. By following established design patterns, developers can ensure their smart contracts are reliable, scalable, and easier to maintain. In this article, we’ll explore some common smart contract design patterns and provide examples of their implementations. Understanding smart contract design patterns is crucial […]
photo of the creator2
blog cover
Blockchain

Understanding Phishing with tx.origin in Solidity

Phishing attacks have become a significant concern in the digital world, and it is essential to take measures to protect against them. In the blockchain industry, Solidity is the most popular language for developing smart contracts, but it is also vulnerable to phishing attacks. In this article, we will explain how tx.origin works and how […]
photo of the creator2
blog cover
Blockchain

Hiding Malicious Code with External Contracts

If you’re building smart contracts with Solidity, you’re likely aware of the importance of security. However, even with the best intentions, malicious code can still find its way into your codebase. One way attackers can hide malicious code is by using external contracts. In this article we’ll discuss how to protect your smart contracts from […]
photo of the creator2
blog cover
Blockchain

Preventing re-entrancy attacks in Solidity

Re-entrancy is a vulnerability in smart contracts that can result in unexpected behavior and loss of funds. This vulnerability enables an attacker to execute a function call repeatedly before the original call has completed. Therefore, re-entrancy can change the contract’s state in unforeseen ways and trigger unintended operations. This can lead to significant security risks, […]
photo of the creator2