From Building Workflows to Breaking ThemPotential vulnerabilities both developers and auditors should look forJan 2A response icon1Jan 2A response icon1
Building with Chainlink CRE — Lessons from Developing a Decentralized x402 Payment FacilitatorWhat I learned building three complex workflows at ETHGlobal Buenos AiresNov 28, 2025Nov 28, 2025
Published inCoinmonksWhy everyone in web3 should participate in Hackathon at least once !Tips and tricks from +10 hackathon winnerOct 18, 2025Oct 18, 2025
0xVillage: Unique Post-Devconnect ExperienceWhere Dreams of Crypto community Meet Nature’s EmbraceDec 6, 2023Dec 6, 2023
Published inCoinmonks10 smart contract vulnerabilities with code examplesA Comprehensive Guide for Understanding and Mitigating Security Risks in Blockchain Smart Contracts.Sep 26, 2023A response icon1Sep 26, 2023A response icon1
Published inCoinmonksUnderstanding Smart Contract Vulnerabilities: A Case Study on the Euler Finance HackSep 18, 2023Sep 18, 2023