Simple guide for bootstrapping your business on-chain
Protect yourself against the recent Ledger attack
Retrospective on a critical bridge vulnerability that was detectable by a linter
Smart contract changes do not get enough scrutiny from bounty hunters — here’s how you can change that.
Do not use contract burns, use well-known burn addresses.
Steps to integrate Nix into your personal setup.