https://blog.trailofbits.com/2025/02/12/the-call-for-invariant-driven-development/
对于 #fuzz 测试方法 invariant test 的详细介绍
对于 #fuzz 测试方法 invariant test 的详细介绍
The Trail of Bits Blog
The call for invariant-driven development
Writing smart contracts requires a higher level of security assurance than most other fields of software engineering. The industry has evolved from simple ERC20 tokens to complex, multi-component DeFi systems that leverage domain-specific algorithms and handle…
👍1
👍1
https://hackmd.io/@keone/how-monad-works
monad 工作原理
monad 工作原理
HackMD
How Monad Works - HackMD
Summary / Network ParametersMonad is EVM bytecode-equivalent (you can redeploy bytecode without recompilation)Cancun fork (TSTORE, TLOAD, MCOPY) is supportedOpcode to gas units mapping is same as Ethereum (e.g. ADD is 4)RPC is compatible with geth, see RPC…
👍2
https://github.com/pcaversaccio/safe-tx-hashes-util
一个用于识别 safe 多签钱包签名交易的工具
一个用于识别 safe 多签钱包签名交易的工具
GitHub
GitHub - pcaversaccio/safe-tx-hashes-util: This Bash script calculates the Safe transaction hashes by retrieving transaction details…
This Bash script calculates the Safe transaction hashes by retrieving transaction details from the Safe transaction service API and computing both the domain and message hashes using the EIP-712 st...
Web3ReadList
https://aszepieniec.github.io/stark-anatomy/ #zk #STARK 的入门文章 #tutorial
https://blog.zksecurity.xyz/posts/circle-starks-1/
https://blog.zksecurity.xyz/posts/circle-starks-2/
关于 #zk #STARK 算法解析的系列文章,应该有 4 篇,目前发布了 2 篇
https://blog.zksecurity.xyz/posts/circle-starks-2/
关于 #zk #STARK 算法解析的系列文章,应该有 4 篇,目前发布了 2 篇
blog.zksecurity.xyz
Circle STARKs: Part I, Mersenne - ZKSECURITY
Discover the intriguing world of Circle STARKs and how they can supercharge zero-knowledge proofs. This blog post sets the stage for a fascinating series about utilizing Mersenne prime fields to achieve lightning-fast arithmetic operations in STARK systems.…