DEV Community

Blockchain

A decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that are used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Track Where Your Web3 Users Come From (7 Steps to Onchain Attribution)

How to Track Where Your Web3 Users Come From (7 Steps to Onchain Attribution)

Comments
9 min read
VORTEX-2048 – A custom 2048-bit Hashing Algorithm and Blockchain

VORTEX-2048 – A custom 2048-bit Hashing Algorithm and Blockchain

Comments 1
1 min read
We Built an x402 Gateway — Here's What We Learned

We Built an x402 Gateway — Here's What We Learned

Comments
4 min read
How Unified Attribution Boosts Web3 Startup ROI and User Retention

How Unified Attribution Boosts Web3 Startup ROI and User Retention

Comments
3 min read
The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

Comments
6 min read
How Blueprint SDK Turns x402 Payments into Runnable Jobs

How Blueprint SDK Turns x402 Payments into Runnable Jobs

Comments
10 min read
Donation Attacks on Compound-Fork Lending Protocols: Dissecting the Venus Protocol THE Exploit

Donation Attacks on Compound-Fork Lending Protocols: Dissecting the Venus Protocol THE Exploit

Comments
7 min read
The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

Comments
6 min read
Tempo VS Ethereum Account Abstraction: What Actually Differs

Tempo VS Ethereum Account Abstraction: What Actually Differs

1
Comments
10 min read
Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Comments
8 min read
Build a Solana Token Price Monitor in 50 Lines of Code

Build a Solana Token Price Monitor in 50 Lines of Code

Comments
1 min read
PayRam's MCP and Card-to-Crypto Onramp: The End of Payment Processor Dependency

PayRam's MCP and Card-to-Crypto Onramp: The End of Payment Processor Dependency

Comments
3 min read
Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Governance Timelock Bypass: 6 Attack Patterns and How to Design Them Out

Comments
6 min read
AI API Cost Control: How x402 Prevents $47K Budget Overruns

AI API Cost Control: How x402 Prevents $47K Budget Overruns

Comments
5 min read
Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

1
Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.