Ledger is hiring a Senior SDET to support quality assurance across its digital asset and Web3 product environment by enabling automation, improving testing methodologies, and enhancing CI/CD reliability. This role involves designing automation tools, creating test frameworks, and working closely with product teams to embed test ownership into development workflows....
Blockstream is seeking a Rust-Simplicity Maintainer to oversee its Rust-based implementation of the Simplicity language and related libraries. The role centers on maintaining multiple interconnected crates—such as rust-simplicity, SimplicityHL, hal-simplicity, rust-elements, and elements-miniscript—ensuring they function cohesively within the broader Simplicity ecosystem. This position involves architecture, implementation, testing, and long-term maintenance...
Kraken is hiring a Rust-focused Software Engineer to support onchain engineering initiatives across its products. The role sits within a small backend engineering group responsible for designing, implementing, and maintaining Rust services that interact with multiple blockchain networks. This engineer will contribute to distributed system architecture, develop new features from...
Svix is hiring a Rust-focused Backend Engineer to help build and scale its server-to-server communication platform. The company develops high-performance message delivery infrastructure used by customers ranging from fast-growing startups to large enterprises. This role involves implementing backend services in Rust, designing systems that support high availability, and contributing to...
Breeze is developing infrastructure that enables users to earn yield on digital assets through a non-custodial platform directly embedded into existing applications. This role centers on designing Rust-based Solana programs and maintaining backend components such as indexers, risk engines, and analytics systems. The engineer will work closely with product and...
Most Web3 founders rethink their hiring approach only after they’ve made a painful mis-hire. And in smart contract engineering, that mistake doesn’t just slow down delivery — it changes how...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
EXTCODEHASH returns the hash of a contract’s deployed bytecode, allowing detection of code changes or empty accounts. Auditors use it to verify contract identity and defend against unexpected contract replacement patterns
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
immutable variables are stored directly in bytecode, not in storage, reducing runtime gas and preventing accidental overwrites. It is a common optimization technique in gas-efficient contract design.
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
If the constructor reverts, the entire deployment fails and no contract is created. This prevents partially-initialized smart contracts from being pushed on-chain
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
MSTORE triggers memory expansion when writing to higher memory slots. Memory grows quadratically, so developers must understand how loops and large arrays impact gas.
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
delegatecall executes callee code in the caller’s storage context, leading to storage collisions and privilege escalation. This is a key attack vector in proxy contracts.
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
Fallback functions run automatically when unknown calls or plain ETH are sent. If they contain external calls or heavy logic, attackers can trigger recursion or re-entrancy. They must be kept minimal and safe.
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
encodePacked removes padding, which can produce identical byte sequences for different inputs. When combined with hashing, this may cause collisions. Using abi.encode is safer for multi-field data.
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.
Chainalysis develops blockchain data tools used by government agencies, financial institutions, and organizations to understand on-chain activity. The Senior Solutions Architect role sits within the Solutions Architecture function and supports the sales cycle by translating customer objectives into technical paths for implementation. This position requires a strong understanding of Chainalysis’...