The technical content top engineers rely on to level up.

The interest rate model of Aave V3 and Compound V2 Interest rates in TradFi (traditional finance) are largely determined by central banks and influenced by market factors. In contrast, DeFi interest...
Last updated on Aug 29, 2025
3 min read
The Fallback Extension Pattern The fallback-extension pattern is a simple way to circumvent the 24 KB smart contract size limit. Suppose we have functions and in our primary contract and wish to add...
Last updated on Oct 22, 2025
6 min read
EIP 1967 Storage Slots for Proxies EIP 1967 is a standard for where to store information that proxy contracts need to execute. Both the UUPS (Universal Upgradeable Proxy Standard) and the Transparent...
Last updated on Oct 22, 2025
The staking algorithm of SushiSwap MasterChef and Synthetix The MasterChef and Synthetix staking algorithms distribute a fixed reward pool among stakers according to their time-weighted contributions...
Last updated on Oct 29, 2025
The second preimage attack for Merkle Trees in Solidity The _second preimage attack_ in Merkle trees can happen when an intermediate node in a Merkle tree is presented as a leaf. The name of this...
Last updated on Oct 22, 2025
4 min read
How Chainlink Price Feeds Work Chainlink price oracles are smart contracts with public view functions that return the price of a particular asset denominated in USD. Off-chain nodes collect the...
Last updated on Oct 8, 2025
8 min read
Layer 2 Calldata Gas Optimization Update for mid 2024: As of the Dencun upgrade, calldata optimization doesn't have as much of an impact since the transactions on most L2s are stored on blobs,...
Last updated on Oct 22, 2025
11 min read
DeFi Lending: Liquidations and Collateral In TradFi, when someone defaults on a loan, the creditor has the right to seize assets or garnish wages. In DeFi, when someone defaults on a loan it isn’t...
Last updated on Sep 24, 2025
6 min read
ERC20 Snapshot ERC20 Snapshot solves the problem of double voting. If votes are weighed by the number of tokens someone holds, then a malicious actor can use their tokens to vote, then transfer the...
Last updated on Oct 22, 2025
Generate Ethereum Address from Private Key Python Generate Ethereum Address from Public Key An Ethereum address is the last 20 bytes of the keccak256 of the public key. The public key algorithm is...
Last updated on Oct 22, 2025
7 min read
Solidity Gasleft Introduction The purpose of this article is to describe the behavior of the Solidity function and its uses. It is a built-in function that is used to check the remaining gas during a...
Last updated on Oct 29, 2025
12 min read
Ethereum smart contract creation code This article explains what happens at the bytecode level when an Ethereum smart contract is constructed and how the constructor arguments are interpreted. Table...
Last updated on Oct 22, 2025