B009: EVM Tricks

Native Data Types

Seemingly Optimized Pattern

Variable Tight-Packing

Hidden Gas Costs

1inch: Example of CALLVALUE Optimizations
Example of Access Control Optimization

Conclusion

--

--

--

A Solidity security auditor keen to share his knowledge.

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Ushering In a New Era of Bounties

Into the Future: Analysis and Predictions of Cryptocurrency

What Burning Man Teaches You About Blockchain, Crypto, and an Abundance Mindset (Part 3)

Bitcoin (BTC) Savings Round 12 is Open now

Knownsec Blockchain Lab|Analyze the stability principle of algorithm stablecoin

Dev Bounty Winners Announcement

19/01 Market outlook

How To Make Money When The Cryptocurrency Market Is Tanking

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alex Papageorgiou

Alex Papageorgiou

A Solidity security auditor keen to share his knowledge.

More from Medium

Laika Blockchain Lab (20 Dec 2021 Update)

官方 | IPFS 浏览器连接教程

The Coming Wave: 5 Ways That Web 3.0 Allow You to be a Better Consumer

Ancon Protocol Node — Rust Smart Contracts