• Application deadline: 2 days
    S

    Product Designer (UI/UX)

    Spree.FinanceFULL_TIMENA

    Job description
    Spree.Finance builds a loyalty and payments platform that aggregates loyalty points and stablecoins into a single, spendable, yield-bearing token used by merchants and consumers. The Product Designer (UI/UX) role owns the design of current and future products across the Spree Loyalty OS, translating complex infrastructure and token-based systems into intuitive...
  • #A
    #B
    #C
    #D
    Explanation:
    If the implementation contract is self-destructed, proxies break permanently or redirect unexpectedly. This creates bricked contracts and undefined behavior
  • Difficulty - Medium
    Total Plays - 7
    Allowed Time - 10 sec
    Best time - 3.010 sec

    5. Why is delegatecall risky?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    delegatecall executes callee code in the caller’s storage context, leading to storage collisions and privilege escalation. This is a key attack vector in proxy contracts.
  • 4
    Replies
  • #A
    #B
    #C
    #D
    Explanation:
    Attackers can trick users into calling a malicious contract. That contract then makes a call where tx.origin equals the victim’s address. This bypasses access control and leads to unauthorized actions.
  • Difficulty - Medium
    Total Plays - 7
    Allowed Time - 10 sec
    Best time - 10 sec

    Why are multi-step writes risky?

    Tip: Click "Play" to reveal options and start playing.
    #A
    #B
    #C
    #D
    Explanation:
    Multi-step operations can leave the contract in a partially updated state if execution halts. Attackers exploit these interim states to bypass checks.
  • Ashwinikumar Dodani

    Ashwinikumar Dodani

    @Ashwinikumar3w

    Marketing x Web3 Jobs

    What do you think about the current status of marketing jobs in web3?Given a lot of people can write content, create visuals and post it too, how do you see...
    2
    Replies
  • #A
    #B
    #C
    #D
    Explanation:
    encodePacked removes padding, which can produce identical byte sequences for different inputs. When combined with hashing, this may cause collisions. Using abi.encode is safer for multi-field data.
  • Application deadline: 2 weeks
    A

    Solutions Engineer

    AlchemyFULL_TIMENA

    Job description
    Alchemy provides developer infrastructure, APIs, and tooling used to build and scale onchain applications and rollups. The Solutions Engineer role works closely with strategic customers to design, optimize, and extend their use of Alchemy’s infrastructure. This position combines systems design, hands-on coding, and customer-facing collaboration. You will advise teams on...
  • 3
    Replies
  • #A
    #B
    #C
    #D
    Explanation:
    If the constructor reverts, the entire deployment fails and no contract is created. This prevents partially-initialized smart contracts from being pushed on-chain
  • 2
    Replies
  • 0
    Replies
  • 1
    Replies
  • #A
    #B
    #C
    #D
    Explanation:
    EXTCODEHASH returns the hash of a contract’s deployed bytecode, allowing detection of code changes or empty accounts. Auditors use it to verify contract identity and defend against unexpected contract replacement patterns
Home Channels Search Login Register