Ever wondered why some hackers seem to have a sixth sense of where to find bugs? How do you get that same sixth sense and become a top web3 security specialist? That's what I explored during my talk at the DeFi Security Summit 101 this year, and this article is a written version of it!
A simple explainer of y combinators using a python example.
Finding bugs is just one part of the bug hunting process. Once you've found a bug, you write a report, and more importantly, you must write a proof of concept. It helps you
How an attacker would have gotten free leverage by selling ITM options.
Like anyone starting with something new, I made some mistakes when I just started bug bounty hunting. Here are some of my mistakes so that you might avoid them: 1 - I Had