Actlysis

1.2K posts

Actlysis banner
Actlysis

Actlysis

@actlysis

Aspiring smart contract auditor & developer | Obsessed with Linux 🐧 | Check out https://t.co/5BQdkusm6E | 💻 https://t.co/iL9cWNIFBe

404 Katılım Ağustos 2025
545 Takip Edilen177 Takipçiler
Sadik
Sadik@0xsadikbaba·
Eid Mubarak from medina
Sadik tweet mediaSadik tweet media
Norsk
6
0
20
354
Actlysis
Actlysis@actlysis·
@Web3_Vinay Anytime I keep seeing your tweet it motivate me more to push
English
0
0
0
15
Vinay ⧫ OnChain
Vinay ⧫ OnChain@Web3_Vinay·
🦖 Day 277 of learning blockchain 🔗 Today I started diving into Chainlink Payment Abstraction V2 What I learned about the protocol: → V2 replaces Uniswap V3 fixed swaps with a permissionless Dutch auction mechanism where anyone can bid on auctioned assets → How the linear price decay curve works — price starts at a premium and decays to a maximum discount over the auction duration → CowSwap integration via ERC-1271 — smart contracts post limit orders that CowSwap solvers compete to fill → Chainlink Data Streams integration for high frequency price updates during auctions with Data Feeds as fallback → AuctionBidder contract — handles arbitrary swap execution via callbacks, enabling DEX aggregator integration → WorkflowRouter — the onchain security gatekeeper with a 3-layer allowlist (workflowId → target → selector) for CRE workflow payloads
Vinay ⧫ OnChain tweet media
English
2
0
43
479
Wallflower 🌼
Wallflower 🌼@Wallflower1x0·
I just deployed and minted my FIRST EVER NFT on Sepolia with Foundry —and it feels surreal!🚀 Funny story: I was deep in the code, forgot to save, and accidentally shut my laptop. When I came back and saw my files gone,everywhere first blur😭,anyways I rebuilt it and minted it.
Wallflower 🌼 tweet media
English
13
1
42
636
Nischay
Nischay@Nischay42·
@actlysis So you both brothers are in programming, that's interesting
English
1
0
1
7
Nischay
Nischay@Nischay42·
Day 13 of #learningDsa Explored Graphs —undirected, directed, and weighted graphs. Learned how graphs can be stored using matrix representation and implemented an adjacency matrix creating a graph class, adding edges, and printing the matrix #DSA #LearningInPublic
Nischay tweet mediaNischay tweet media
English
1
0
5
88
Rosario Borgesi
Rosario Borgesi@rosarioborgesi·
⚡Day 6 of Ethernaut with @OpenZeppelin ⚙️ Challenge 11: Elevator ✅ Challenge 10: Re-entrancy ✅ Challenge 09: King ✅ Challenge 08: Vault ✅ Challenge 07: Force ✅ Challenge 06: Delegation ✅ Challenge 05: Token ✅ Challenge 04: Telephone ✅ Challenge 03: Coin Flip ✅ Challenge 02: Fallout ✅ Challenge 01: Fallback ✅ Challenge 00: Hello Ethernaut Github 👇 github.com/rosarioborgesi…
English
2
0
18
255
Actlysis
Actlysis@actlysis·
🗓️ Day 50 – Smart Contract Journey 🚀 🔹Topic: Calldata Manipulation & ABI Encoding 📚 Key Learnings: ✅ Completed Switch level ✅ Learnt how to use cast pretty-calldata to format and break down calldata into readable segments (selector, offsets, lengths, data) ✅ Learnt how to craft custom calldata ✅ Corrected misunderstanding of how the EVM perceives calldata ✅ Understood that offsets point to where data is located, and at that location the first value is the data length before copying ✅ Understood that the EVM reads calldata in 32-byte words 💡 Security Mindset: Contracts that enforce access control using fixed positional bytes in calldata can be manipulated by attackers through crafted offsets and layout tricks 💡 Reflection: I initially assumed calldata had a rigid structure (head offset then size), but in reality it’s more flexible, understanding offsets changed how I see calldata and exposed how it can be abused
Actlysis tweet mediaActlysis tweet media
English
0
0
10
109
Wake
Wake@WakeFramework·
@actlysis Hey! Thanks for the feedback. Much appreciated. The solution is simple, just remove these 2 entries in VS Code settings of the extension. Also, consider removing this entry to enable vulnerability detections in test files (although it's not recommended).
Wake tweet mediaWake tweet media
English
1
0
1
10
Wake
Wake@WakeFramework·
Most Solidity bugs in factory contracts hide in one place: the gap between what the factory deploys and what the registry assumes it deployed. Factories look simple until initialization parameters interact with proxy patterns or create2 salt collisions across chains. The patterns are well-documented. The edge cases are not. This is where fuzz testing earns its keep. Throwing thousands of deployment sequences at a factory contract reveals state assumptions that unit tests treat as given. Wake's fuzzer is built for exactly this kind of guided exploration, testing the contract logic itself rather than a mathematical model of it. Solid educational content for anyone leveling up their Solidity architecture.
jayesh@0xjayeshyadav

Smart contract factories and registries are must know patterns if you want to level up as a Solidity developer or protocol engineer. This video is a full deep-dive explanation, watch till the end to truly master them. Link: youtu.be/SGE5a_CyY8k?si… PS: Watch it at 1.5x for a better experience 😂 This is my first session, so please support and subscribe to Blok Capital on YouTube for more amazing deep dive explanations.

English
1
2
5
143
Tim
Tim@timsilva112·
Today's #solidity grind:Merkle Airdrop contd ✅signature standards ✅ took a quick quiz ✅Decoding ECDSA #signatures ✅Transaction types intro ✅Blob #Transactions ✅Understanding Type 113 transaction ✅Took another quick quiz ✅Implementing Signatures ✅Another quiz 😪
Tim tweet mediaTim tweet mediaTim tweet mediaTim tweet media
English
3
0
22
201
Ilona Goldmane 🦊
Ilona Goldmane 🦊@GoldManeDesign·
When things go wrong, as they sometimes will, And the road you're trudging seems all uphill, When the funds are low and the debts are high, And you want to smile, but you have to sigh, When care is pressing you down a bit, Rest if you must, but don't you quit. 👇
Ilona Goldmane 🦊 tweet media
English
13
0
55
744
Wallflower 🌼
Wallflower 🌼@Wallflower1x0·
Day 63 of my #Blockchain journey! 🎯 Today’s study : ✅ An introduction to Ethereum improvement proposals, ERC-20, and the ERC-20 token standard. ✅ Built an ERC-20 token manually with Foundry. ✅ Implemented an ERC-20 token using OpenZeppelin contracts and Foundry.
Wallflower 🌼 tweet media
English
2
0
22
179
Actlysis
Actlysis@actlysis·
@0xECL_ State corruption risks in foundry test files?
English
1
0
1
12
Elechukwu. C
Elechukwu. C@0xECL_·
🌱 Day 52 of learning blockchain 📚 Today focused on null-value handling. ✅ Explored zero values in dynamic arrays ✅ Observed logic gaps on removal ✅ Traced state corruption risks 🧠 lesson: “null” must be handled deliberately
English
2
0
3
46
Tim
Tim@timsilva112·
✅Modifying my test ✅Testing on zksync @zksync @zkSyncDevs i ran into a bug that might need your attention
Tim tweet media
English
1
0
4
46
Abdulrahman
Abdulrahman@Abdulra75754192·
"If you're nothing without AI, then you are nothing with AI" ~@Jeyffre Scholz
English
1
0
1
15
Vedant Ghate
Vedant Ghate@_0xshunya_·
Done with the Airdrop and Signature section of advanced Foundry course of @CyfrinUpdraft . Learnt about various txn types, merkle based claims, and lot of debugging.
English
2
0
6
37