Spree.Finance builds a loyalty and payments platform that aggregates loyalty points and stablecoins into a single, spendable, yield-bearing token used by merchants and consumers. The Product Designer (UI/UX) role owns the design of current and future products across the Spree Loyalty OS, translating complex infrastructure and token-based systems into intuitive...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
If the implementation contract is self-destructed, proxies break permanently or redirect unexpectedly. This creates bricked contracts and undefined behavior
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
delegatecall executes callee code in the caller’s storage context, leading to storage collisions and privilege escalation. This is a key attack vector in proxy contracts.
I’ve been working as a blockchain developer for a few years now and have started interviewing again, but I’m struggling to make sense of compensation this time around.For similar roles,...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.
What do you think about the current status of marketing jobs in web3?Given a lot of people can write content, create visuals and post it too, how do you see...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
encodePacked removes padding, which can produce identical byte sequences for different inputs. When combined with hashing, this may cause collisions. Using abi.encode is safer for multi-field data.
Alchemy provides developer infrastructure, APIs, and tooling used to build and scale onchain applications and rollups. The Solutions Engineer role works closely with strategic customers to design, optimize, and extend their use of Alchemy’s infrastructure. This position combines systems design, hands-on coding, and customer-facing collaboration. You will advise teams on...
Hello everyone,
I’m a blockchain protocol engineer with a PhD background in applied cryptography and distributed systems, and recent industry R&D experience working with Ethereum execution clients (Nethermind) and consensus–execution...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
If the constructor reverts, the entire deployment fails and no contract is created. This prevents partially-initialized smart contracts from being pushed on-chain
Web3 growth isn’t “post more content” or “run more quests.”In real teams, growth breaks when metrics lie (airdrop spikes), attribution is messy (wallets ≠ users), onboarding friction kills intent, and...
Security has become one of the most talked-about topics in Web3 — and for good reason.Every week, we see new exploits, drained contracts, or projects shutting down because something small...
Tip: Click "Play" to reveal options and start playing.
#A
#B
#C
#D
Explanation:
EXTCODEHASH returns the hash of a contract’s deployed bytecode, allowing detection of code changes or empty accounts. Auditors use it to verify contract identity and defend against unexpected contract replacement patterns