• 3
    Replies
  • 6
    Replies
  • 7
    Replies
  • Application deadline: 4 weeks
    S

    Senior Protocol Engineer

    Squads FULL_TIMENA

    Job description
    Squads is a fintech company building infrastructure and APIs for the stablecoin economy, with products spanning multisig wallets, business accounts, and personal finance applications. The Senior Protocol Engineer will work on Grid, Squads’ stablecoin infrastructure and developer platform, focusing on the Solana programs that power smart account functionality. This role...
  • Application deadline: 4 weeks
    P

    Security Engineer

    Parity FULL_TIMENA

    Job description
    Parity builds and maintains core open-source blockchain infrastructure, including Polkadot, the Polkadot SDK, and Kusama. The Security Engineer will join the Security Engineering team and focus on strengthening the security posture of Parity’s blockchain ecosystem. This role involves auditing and, where required, writing secure Rust code, performing in-depth manual and...
  • Application deadline: 4 weeks
    P

    Smart Contract Engineer

    Polymarket FULL_TIMENA

    Job description
    Polymarket operates a large-scale prediction market protocol where users trade on real-world outcomes using on-chain infrastructure. The Smart Contract Engineer will join the core protocol team and own the design, development, and deployment of Solidity smart contracts that secure and operate high-volume peer-to-peer markets. This role focuses on building and...
  • Application deadline: 4 weeks
    C

    Rust Engineer

    Cryptio FULL_TIMENA

    Job description
    Cryptio builds enterprise-grade back-office and data infrastructure used for accounting, reporting, and operational workflows in the digital asset ecosystem. The Rust Engineer will join the Accounting squad, focusing on the systems that power cost basis calculations, PnL, staking, derivatives, accruals, and large-scale reporting pipelines. This role owns the design and...
  • 0
    Replies
  • 10
    Replies
  • 3
    Replies
  • 1
    Replies
  • 6
    Replies
  • 4
    Replies
  • 1
    Replies
  • #A
    #B
    #C
    #D
    Explanation:
    Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.
Home Channels Search Login Register