Resources

Our blog posts

Stay ahead of the curve with the latest insights and trends from the world of blockchain technology and innovation.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Clear Filter(s)
Tutorial

How to white hat a smart contract

White hatting a protocol means exploiting a vulnerability in a smart contract to save funds, rather than steal them.
Patrick Collins
16
Feb
2024
Read More
Tutorial

Smart Contract Fuzz Tests Using Foundry | Full guide (updated)

Learn how to write Solidity smart contract fuzz tests (fuzzing) using the Foundry framework. Write tests, use prank addresses, and execute them using forge.
Vasiliy Gualoto
04
Mar
2024
Read More
Deep Dive

Upgradable Smart Contracts | What is a Smart Contract Proxy Pattern?

Proxy Smart Contracts patterns are a simple and effective way to create upgradable smart contracts to keep your protocol up to date.
Ciara Nightingale
14
Feb
2024
Read More
Technical

What is the Elliptic Curve Digital Signature Algorithm? - ECDSA Signatures

The Elliptic Curve Digital Signature Algorithm (ECDSA) is based on Elliptic Curve Cryptography (ECC) and is used to generate keys, authenticate, sign, and verify messages
Ciara Nightingale
14
Feb
2024
Read More
Technical

EIP712 and EIP191 | Understanding Ethereum Signature Standards

Learn everything you need to know about the (Ethereum improvement proposal) EIP91, EIP712, and Ethereum signature standards.
Ciara Nightingale
14
Feb
2024
Read More
Security

What is a Blockchain Replay Attack? 5 Most Common Types

Learn what a blockchain replay attack is how it works through 5 common examples.
Ciara Nightingale
14
Feb
2024
Read More
Explainer

What are Blockchain Bridges | Crypto Crosschain in 5 Steps

Learn everything you need to know about Blockchain multichain bridges, how they work, and why they're useful for
Vasiliy Gualoto
08
Feb
2024
Read More
Security

What is a Smart Contract Security Audit?

A Smart Contract Security Audit is a time-boxed, Security-based code review of a Smart Contract or Protocol to enhance Security and identify vulnerabilities.
Cyfrin Team
01
Feb
2024
Read More
Security

Fuzz and Invariant Tests

Smart contracts have been tested and audited, but are they truly bulletproof? When you think your code is secure, an attacker might exploit a vulnerability that you
Patrick Collins
01
Feb
2024
Read More
Security

Smart Contract Formal Verification and Symbolic Execution Testing

We look at formal verification & symbolic execution with two Trail of Bits Web3 security team members. Additionally, we review the value these techniques bring and compar
Patrick Collins
01
Feb
2024
Read More
News

Solodit Joins the Cyfrin Ecosystem

Today, we are excited to announce that we have taken a significant step towards achieving this goal by acquiring Solodit, a powerful tool committed to...
Cyfrin
01
Feb
2024
Read More
Tools

AI Code Debugger | How to debug anything with AI

If you want to debug your code using AI, this is the place to learn the 7 steps to debug anything using AI-assisted code debugging, broken down in 7 easy steps.
Cyfrin
01
Feb
2024
Read More
News

Cyfrin’s 2024 Wrapup: Growth, Education, Security Excellence

Cyfrin saw significant growth in 2024 doubling the team, securing over $10b in blockchain assets, and educating 200k+ students on smart contract development.
Martin Petkov
20
Dec
2024
Read More
Tutorial

Mastering Solidity Gas Efficiency: 12 Tips to Tackle Rising Fees on Base and Other L2 Chains

Cyfrin’s guide to the best Solidity gas optimization techniques for Base and other L2 Chains. Reduce cost with advanced, real-world, and tested strategies.
Jessica Young
05
Dec
2024
Read More
Security

Critical Security Alert: Solana web3.js Library Compromise

A sophisticated supply chain attack has compromized versions 1.95.6 and v1.95.7 of the widely-used @solana/web3.js JavaScript library.
Martin Petkov
04
Dec
2024
Read More
Deep Dive

What is Blockchain Account Abstraction: A 5-Minute Guide

Learn how account abstraction makes crypto safer and easier to use. It adds security features and removes technical barriers to blockchain adoption.
Martin Petkov
02
Dec
2024
Read More
Deep Dive

What Is Blockchain Interoperability: A Complete Guide

Learn what blockchain interoperability is and why it matters. Discover how leading protocols combine its core components to deliver value across industries.
Martin Petkov
21
Nov
2024
Read More
Technical

Uniswap V4 vs V3: Architectural Changes and Technical Innovations with Code Examples

Discover Uniswap V4 architectural updates and technical innovations: new hook system, singleton pattern, flash accounting, fee tier flexibility, native token support.
Giovanni Di Siena
06
Nov
2024
Read More
News

Introducing Cyfrin Profiles and an Enhanced Ecosystem Experience

Introducing Cyfrin Profiles, a unique, personal account delivering a unified experience across the Cyfrin ecosystem.
Cyfrin Team
17
Oct
2024
Read More
Tutorial

7 Tips To Transition from Cybersecurity to Blockchain Security Researcher

Explore 7 tips to transition from traditional cybersecurity into blockchain security research. Get tips for navigating the industry and maximizing your opportunity.
Block
23
Oct
2024
Read More
Explainer

What Is A Blockchain Unconfirmed Transaction?

Blockchain unconfirmed transactions are transactions sent to the blockchain network but not yet included in a block.
ProgrammerSmart
10
Oct
2024
Read More
Product

Introducing Aderyn's Language Server: Elevating Solidity Security with Real-time Feedback

Aderyn's Language Server elevates Solidity developers' experience by providing real-time security diagnostics and coding best practices in any code editor.
Tilak Madichetti and Alex Roan
10
Oct
2024
Read More
Explainer

Flash Loans: Everything You Need To Know

Flash loans are unique financial products, only available in DeFi. This blog post will teach you what a flash loan is, how it works, and what it can be used for.
Patrick Collins
02
Oct
2024
Read More
Explainer

A Full Comparison: What are Fraud Proofs and Validity proofs?

Fraud proofs and validity proofs are both used by rollups to check the validity of transactions. Delve into their differences, functions, and advantages and disadvantages
Ciara Nightingale
01
Oct
2024
Read More
Explainer

A Full Comparison: What are zk-SNARKs and zk-STARKS?

What are zk-SNARKs and what are zk-STARKs? They're both zero-knowledge proofs but what are their features and how do they compare to each other.
Ciara Nightingale
01
Oct
2024
Read More
Explainer

What is a ZK Rollup

Explore ZK and Succinct rollups. Answer the questions: what are ZK rollups, how do they work, and why are they considered the future of Ethereum scaling?
Ciara Nightingale
01
Oct
2024
Read More
Deep Dive

What is a Zero-Knowledge Proof | A Practical Guide for Programmers

What is a zero-knowledge proof (ZKP) and how do they work? Explore ZKPs, survey mathematical ZKPs, and understand what programmers need to know to implement them.
Ciara Nightingale
01
Oct
2024
Read More
Tutorial

Top 10 Solidity Interview Questions

Top 10 Solidity interview questions to help you prepare for your next Solidity technical initerview. Join your dream team as a smart contract developer!
Alex Babits
26
Sep
2024
Read More
Tutorial

Hackathon 101: How to Prepare for a Web3 Hackathon and Be Successful

Discover how to prepare for a Web3 hackathon—from selecting the right event to building a team and managing deadlines—to boost your skills and maximize your fun.
Vasiliy Gualoto
27
Sep
2024
Read More
Explainer

What is a Crypto Honeypot?

Learn what a crypto honeypot is, how these scams trap unsuspecting investors, and discover strategies to identify and avoid them. Stay safe in crypto.
Vasiliy Gualoto
18
Sep
2024
Read More
Foundations

Five Beginner Solidity Projects to Build a Developer Portfolio

Build your Solidity developer portfolio with 5 beginner projects, including crypto lotteries and DAOs. Master smart contracts and excel in the Web3 job market.
Vasiliy Gualoto
05
Sep
2024
Read More
News

Cyfrin To Support Soneium As Ecosystem Security Provider

Cyfrin supports Soneium as ecosystem security partner for their public blockchain ecosystem. Read more about the collaboration and what it means for security.
Cyfrin Team
11
Sep
2024
Read More
Tools

5 Web3 Development Tools to Make Building dApps Easier

Build dApps faster with Web3 tools like Chainlink, Alchemy, and Thirdweb. Use pre-built components and trusted resources for secure, scalable projects.
Vasiliy Gualoto
27
Aug
2024
Read More
Explainer

What is a Soulbound Token? - ERC-5114 & ERC-5484

Learn what Soulbound Tokens (SBTs) are, their differences from NFTs, and explore use cases like digital identity and certifications with insights into ERC-5114 and ERC-54
Vasiliy Gualoto
21
Aug
2024
Read More
Tutorial

How to Implement Permit2

Learn to implement Permit2, the token approval system compatible with all ERC-20 tokens that streamlines user experience and reduces their economic burden.
Alex Babits
26
Aug
2024
Read More
News

Cyfrin and PwC Partner To Strengthen Blockchain Security And Scale Adoption of Blockchain Technology

Cyfrin and PwC Partner To Strengthen Blockchain Security And Scale Adoption of Blockchain Technology.
Cyfrin Team
29
Aug
2024
Read More
Foundations

What is Solidity Programming Language: A Complete Guide

Solidity is a high-level Programming Language for writing Smart Contracts on Ethereum and most EVM-compatible blockchains. Learn more in Cyfrin's deep dive.
Pari Tomar
22
Aug
2024
Read More
Foundations

Introduction to Ethereum Improvement Proposals (EIPs)

Cyfrin's Iintroduction to Ethereum improvement proposals (EIPs). A guide to understanding what they are, how they work, and their importance to the Ethereum ecosystem.
Eze Sunday Eze
21
Aug
2024
Read More
Deep Dive

What is a Merkle Tree, Merkle proof, and Merkle Root

Deep dive into a Merkle Tree's data structure and how Merkle proofs prove data is there. Answer the question: What is a Merkle Tree, Merkle Proof, and Merkle Root?
Ciara Nightingale
16
Aug
2024
Read More
Foundations

Use Cases of Blockchain Beyond the Hype

Blockchain technology opens new avenues of commerce and asset ownership. It also comes with a lot of hype. What are the real use cases for blockchain technology?
Vasiliy Gk
24
Aug
2024
Read More
Deep Dive

Hooks in DEXs: The Future of Liquidity Pools

Introducing Hooks into DEX Liquidity Pools ushers in a new era of customization. Discover how they add functionality, reduce risk, and increase potential rewards.
Jessica Young
24
Jan
2024
Read More
Deep Dive

Ethereum Distributed Validator Technology (DVT) - Full Introduction

Learn about Distributed Validator Technology (DVT) and how it can increase the Ethereum's decentralization, make staking more appealing, and increase network security.
Jessica Young
19
Jan
2024
Read More
Product

Introducing the Cyfrin CodeHawks Update

A completely redesigned competitive smart contract security audit platform with new features and functionality, improved processes, and industry-leading usability.
Cyfrin Team
01
Jul
2024
Read More
Tutorial

How to fix ‘Data location must be memory or calldata‘ | Where can the EVM read and write data?

Learn where the EVM can read and write data, what calldata, memory, and storage are, and the best practices to know when writing your solidity or Vyper smart contracts
Patrick Collins
26
Jun
2024
Read More
Explainer

What is a Blockchain Beacon Chain: The Foundation for Ethereum 2.0

The beacon chain is a fundamental component of Ethereum 2.0, designed to enhance scalability, security, and efficiency by transitioning from a proof of work (PoW) to a pr
Cyfrin Team
11
Jun
2024
Read More
Explainer

What are Tokenized Assets? Crypto RWAs Explained

Tokenized RWAs are real-world assets represented as tokens on the blockchain. Learn what crypto RWAs means, how they work and the list of projects to keep an eye on.
Patrick Collins
23
May
2024
Read More
Deep Dive

What is EIP-4844? Proto-Danksharding and Blob Transactions Explained

What is the EIP-4844? Learn what proto-danksharding and blobs are, how they work, and how to send your first blob transaction using the new Ethereum improvement proposal
Patrick Collins
22
May
2024
Read More
Foundations

Proof of Stake (PoS) Vs Proof of Work (PoW) - The Full Comparison

In this guide, we explore what are the differences between Proof of Work (PoW) and. Proof of Stake (PoS), two Sybil resistance mechanisms used in blockchain networks.
Patrick Collins
22
May
2024
Read More
Foundations

What Are Blockchain Rollups? A Full Guide to ZK and Optimistic Rollups

What are crypto blockchain rollups? Learn everything you need to know about optimistic and zero-knowledge based rollups, how they work, and their differences.
Ciara Nightingale
20
May
2024
Read More
News

Cyfrin Launches Smart Contract Courses and Security Audits to Support Projects and Developers on zkSync

Cyfrin supports projects and developers on zkSync in accessing high-quality public and private audits as well as top-notch smart contract development and security courses
Cyfrin Team
10
May
2024
Read More
Foundations

What is a Layer 1 Blockchain? A Comprehensive Guide to L1s

An L1, or Layer 1 blockchain, refers to the base layer of a blockchain ecosystem. Learn everything you need to know about what are layer 1 blockchains and how they work.
Cyfrin Team
30
Apr
2024
Read More
Deep Dive

Blockchain and Crypto Front Running - What is and how does it work?

Front-running in crypto or Blockchain occurs when someone intentionally enters a transaction into a block before you to try to extract some value.
Patrick Collins
22
May
2024
Read More
Foundations

Blockchain Architecture Layers: Guide and Topology

Learn the intricacies of blockchain architectures like Ethereum and Bitcoin, broken down into easy-to-understand pieces. From functional layers to layers 1 and 2.
Cyfrin Team
30
Apr
2024
Read More
Product

Find Vulnerabilities in Your Solidity Codebase Using Cyfrin Aderyn

Open-sourced Rust-based Smart Contract static analyzer designed to help protocol engineers and security researchers find vulnerabilities in Solidity code bases
Cyfrin Team
22
Apr
2024
Read More
Technical

What is a Smart Contract ABI and How to Get it

The ABI of a smart contract is an acronym for the “Application Binary Interface.” It defines the standard way to interact with contracts in the Ethereum ecosystem;
Patrick Collins
19
Apr
2024
Read More
Explainer

A comprehensive guide to Ethereum Blockchain Testnets

What is an Ethereum blockchain testnet? Learn everything you need to know about crypto testnets, faucets and how blockchain test networks work in this comprehensive guide
Patrick Collins
19
Apr
2024
Read More
Tutorial

2 Ways to Console Log in Solidity Smart Contracts

Learn how to console log variables in Solidity smart contracts using Foundry and Hardhat and debug your smart contracts without using events.
Patrick Collins
19
Apr
2024
Read More
Deep Dive

What is a Blockchain Mempool and How Does it Work?

Learn what is a blockchain mempool on Ethereum and Bitcoin, how it works and what private mempools are.
Patrick Collins
19
Apr
2024
Read More
Foundations

What is a Crypto Hardware Wallet and How Does it Work?

A crypto Hardware Wallet is a physical device that Securely Stores private cryptographic keys offline. Learn More in Cyfrin's Full Guide to hardware wallets.
Cyfrin Team
19
Apr
2024
Read More
Foundations

What is a Crypto Cold Storage Wallet? Full guide

A cold storage crypto wallet is a type that isn’t connected to the internet and is less likely to be exposed to online threats like malware or phishing attacks.
Cyfrin Team
19
Apr
2024
Read More
Security

The Full Guide on Reentrancy Attacks in Solidity Smart Contracts

What is a Reentrancy Attack in Solidity smart contracts? Learn how blockchain reentrancy attacks work and how to protect your smart contracts from them.
Ciara Nightingale
19
Apr
2024
Read More
Foundations

5 Best Courses To Learn Solidity From Scratch - For Free

The best smart contract development courses, boot camps, certifications, and resources to learn Solidity development from scratch and kickstart your career for free.
Cyfrin Team
19
Apr
2024
Read More
News

Cyfrin and Chainlink Labs Establish Strategic Alliance To Support Chainlink BUILD and SCALE Projects

Cyfrin has formed an alliance with Chainlink Labs to provide Chainlink BUILD and SCALE projects with industry-leading security
Cyfrin Team
18
Apr
2024
Read More
Security

Top 5 smart contract auditing and security courses

Top smart contract auditing and security courses to become a smart contract auditor or level up your web3 development career
Vasiliy Gualoto
04
Apr
2024
Read More
Security

10 Steps to Systematically Approach A Smart Contract Audit

In this article, we will go through 10 key steps to systematically approach a smart contract audit, independently of code size or complexity, as security researchers.
Travis Montgomery
22
Mar
2024
Read More
Security

WOOFi Exploit | Hack Analysis

On March 5th 2024, WOOFi’s synthetic proactive market making (sPMM) algorithm that controls the pricing of WOOFi Swaps was exploited on Arbitrum for $8.6M. Here's how.
Ciara Nightingale
11
Mar
2024
Read More
Security

Seneca Attack - Hack Analysis & Proof of Concept

Seneca Protocol is a decentralized finance product which was exploited for $6million. Here is how it happened, a proof of concept, and how to mitigate it.
Ciara Nightingale
06
Mar
2024
Read More
Tools

8 Industry-leading Smart Contract Security Auditing Tools

We’ve tested and found the best smart contract auditing and security tools every web3 smart contract developer should include in their stack. 
Vasiliy Gualoto
04
Mar
2024
Read More
Deep Dive

What is Sybil Resistance in Blockchain? Understanding Sybil Attacks

Sybil attacks undermine the integrity and security of blockchain networks. This article explores what is Sybil resistance, its consequences, and mitigations.
Ciara Nightingale
04
Mar
2024
Read More
Technical

EIP 3664 - The full guide to advanced NFT properties

EIP 3664 extends NFT standards to enable customizable, interoperable, and evolvable NFT attributes. You'll learn how to use it, how it works, and its ecosystem impact.
Sidharth Kumthekar
11
Mar
2024
Read More
Deep Dive

Understanding Blockchain Double Spending Attacks - With examples

In this article, we explore how blockchain double spending attacks occur, with examples and ways to mitigate and avoid them.
Ciara Nightingale
26
Feb
2024
Read More
Security

How did the Euler Finance hack happen? - Full Hack Analysis

Euler Finance was hacked for ~$200M due to a missing check on the liquidity status. We explore a step by step of how this attack happened, including a proof of concept.
Ciara Nightingale
21
Feb
2024
Read More
Tutorial

How to white hat a smart contract

White hatting a protocol means exploiting a vulnerability in a smart contract to save funds, rather than steal them.
Patrick Collins
16
Feb
2024
Read More
Tutorial

Smart Contract Fuzz Tests Using Foundry | Full guide (updated)

Learn how to write Solidity smart contract fuzz tests (fuzzing) using the Foundry framework. Write tests, use prank addresses, and execute them using forge.
Vasiliy Gualoto
04
Mar
2024
Read More
Deep Dive

Upgradable Smart Contracts | What is a Smart Contract Proxy Pattern?

Proxy Smart Contracts patterns are a simple and effective way to create upgradable smart contracts to keep your protocol up to date.
Ciara Nightingale
14
Feb
2024
Read More
Technical

What is the Elliptic Curve Digital Signature Algorithm? - ECDSA Signatures

The Elliptic Curve Digital Signature Algorithm (ECDSA) is based on Elliptic Curve Cryptography (ECC) and is used to generate keys, authenticate, sign, and verify messages
Ciara Nightingale
14
Feb
2024
Read More
Technical

EIP712 and EIP191 | Understanding Ethereum Signature Standards

Learn everything you need to know about the (Ethereum improvement proposal) EIP91, EIP712, and Ethereum signature standards.
Ciara Nightingale
14
Feb
2024
Read More
Security

What is a Blockchain Replay Attack? 5 Most Common Types

Learn what a blockchain replay attack is how it works through 5 common examples.
Ciara Nightingale
14
Feb
2024
Read More
Explainer

What are Blockchain Bridges | Crypto Crosschain in 5 Steps

Learn everything you need to know about Blockchain multichain bridges, how they work, and why they're useful for
Vasiliy Gualoto
08
Feb
2024
Read More
Security

What is a Smart Contract Security Audit?

A Smart Contract Security Audit is a time-boxed, Security-based code review of a Smart Contract or Protocol to enhance Security and identify vulnerabilities.
Cyfrin Team
01
Feb
2024
Read More
Security

Fuzz and Invariant Tests

Smart contracts have been tested and audited, but are they truly bulletproof? When you think your code is secure, an attacker might exploit a vulnerability that you
Patrick Collins
01
Feb
2024
Read More
Security

Smart Contract Formal Verification and Symbolic Execution Testing

We look at formal verification & symbolic execution with two Trail of Bits Web3 security team members. Additionally, we review the value these techniques bring and compar
Patrick Collins
01
Feb
2024
Read More
News

Solodit Joins the Cyfrin Ecosystem

Today, we are excited to announce that we have taken a significant step towards achieving this goal by acquiring Solodit, a powerful tool committed to...
Cyfrin
01
Feb
2024
Read More
Tools

AI Code Debugger | How to debug anything with AI

If you want to debug your code using AI, this is the place to learn the 7 steps to debug anything using AI-assisted code debugging, broken down in 7 easy steps.
Cyfrin
01
Feb
2024
Read More
Tutorial

How to Get All the Transactions From a Contract Address

In this tutorial, you will learn several techniques for querying and retrieving all transactions from a contract address.
Patrick Collins
01
Feb
2024
Read More
Security

Top 10 smart contract auditing companies and services

There are many smart contract auditing companies and services that can provide the best solutions for your audit. Find the best smart contract security auditors this year
Pari Tomar
01
Feb
2024
Read More
Foundations

Smart Contract Security Auditor Salary Guide 2024

With an average of $105k per year, smart contract auditor salaries range between $33k and $200k, recently rising as blockchain protocols demand more security,
Pari Tomar
01
Feb
2024
Read More
Foundations

Blockchain Developer Roadmap - The Full Guide

The full blockchain developer roadmap to bring you from beginner to advanced with the world's top courses and smart contract development resources- completely free.
Vitto Rivabella
01
Feb
2024
Read More
Security

Competitive vs Private Audits - Pros and Cons | The full comparison

Competitive vs private audits? In this guide, you will learn when and how to decide which smart contract security audit type is the best for your protocols.
Vasiliy Gualoto
01
Feb
2024
Read More
Tutorial

11 Advanced Solidity Gas Optimization Tips

In this guide on the best Solidity gas optimization techniques, you will learn 11 advanced, real-world, and tested strategies
Vasiliy Gualoto
01
Feb
2024
Read More
Foundations

Best Web3 Wallets | Safest ways to store your crypto

The safest ways to store crypto and the best web3 wallet depend on where you are in your web3 journey. In this guide, you'll learn how to find it out.
Patrick Collins
01
Feb
2024
Read More
Tools

Top 5 Web3 Developer Tools | Languages, frameworks, and security

Top tested industry-leading web3 development tools for blockchain and smart contract developers to help you speed up your workflows and allow you to code.
Patrick Collins
01
Feb
2024
Read More
Tutorial

How to become a Smart Contract Auditor | Full Roadmap

Learn how to become a smart contract auditor (security researcher) and kickstart your career from this full roadmap with the best resources and courses in web3
Patrick Collins
01
Feb
2024
Read More
Foundations

Top 9 Courses to Learn Web3 Development For Free

Learn how to develop web3 with this step-by-step roadmap and free courses. Learn smart contracts development and kickstart your blockchain career.
Patrick Collins
01
Feb
2024
Read More
Security

What is fuzzing (fuzz tests) - Cybersecurity and Smart Contracts

What is fuzz testing? In this guide, you will learn everything you need to know about smart contracts fuzzing and invariants testing using foundry.
Vasiliy Gualoto
01
Feb
2024
Read More
Security

Price Oracle Manipulation Attacks - The Full Guide

A deep dive into price oracle manipulation attacks, learn everything you need in this full guide with examples.
Juliette Chevalier
01
Feb
2024
Read More
No Results
Clear Filter(s)