Blog

Smart Contract Security

Polygon Zk roll up

Polygon ZK-RollUp: An Incredibly Simple Explanation 

Read Time: 9 minutes Polygon maintains its crown by bringing in ZKrollup. Problem with Ethereum Mainnet Ethereum is the backbone of the web3 ecosystem. It continues to surprise the most brilliant minds in the world with the potential it carries. The potential of diversified applications would make even Einstein scratch his head for a moment. But yeah, it is …

Polygon ZK-RollUp: An Incredibly Simple Explanation  Read More »

Ice Phishing Attack

What are Ice Phishing Attacks and How to Avoid Getting ‘Hooked’

Read Time: 6 minutes In the web3 world, phishing attempts come in a variety of forms. Since the technology is still developing, new kinds of attacks can arise. Some attacks, such as ice phishing, are specific to Web3, while others resemble the more common credential phishing attacks on Web2. Before knowing what exactly an ice phishing attack is and …

What are Ice Phishing Attacks and How to Avoid Getting ‘Hooked’ Read More »

Smart Contract Security Practices

Analysis of Smart Contract Security Practices by Developers 

Read Time: 5 minutes Since DeFi started skyrocketing, a new wave of smart contract attacks leading to the loss of hundreds of millions of dollars has emerged. It is clear from the rising hack figures that security is critical for smart contracts.  Most of the vulnerabilities can be averted at the development stage of contracts if the best practices …

Analysis of Smart Contract Security Practices by Developers  Read More »

DAO Governance Attacks

DAO Governance Attacks and How to Prevent them

Read Time: 6 minutes As blockchain has seen plenty of applications recently, this traction has created hype around the DLT (distributed ledger technology). Blockchain is considered the building block of crypto and thus has come up with offerings that serve different purposes. It has pushed decentralization with NFTs, dApps, DeFi, and smart contracts. The emergence of DAOs has given …

DAO Governance Attacks and How to Prevent them Read More »

Smart Contract on Polygon

Tutorial: Deploying Smart Contracts on Polygon Chain

Read Time: 4 minutes What is Polygon Network? Polygon, formerly known as Matic Network and founded in 2017, has always focused on developing Ethereum scaling architecture. Polygon is a Layer 2 scaling solution for the Ethereum blockchain. Polygon functions as a faster blockchain that runs concurrently with the Ethereum blockchain, which has multiple sidechains. Polygon processes transactions on-chain using …

Tutorial: Deploying Smart Contracts on Polygon Chain Read More »

DAO Smart Contract Audits

How do DAO Smart Contract Audits help In Reinforcing Security?

Read Time: 6 minutes The creation of DAO is unique to web3, which leverages the competency of blockchain in governing the protocols without involving centralized entities.   DAO is heavily centred around two facets- encryption and distributed storage. This bestows them with the capabilities to run based on the collective decision of community members. As with any Web3 protocol, security …

How do DAO Smart Contract Audits help In Reinforcing Security? Read More »

QuillAudits Partnership & Affiliate Program

Earn Rewards, Make a Difference: QuillAudits Partnership & Affiliate Program

Read Time: 5 minutes As happened with the previous iterations of the web, the security models unfold to align with its application architecture.  Much like that, Web3 pitches in decentralized applications controlled through blockchain with its own security design. The decentralization of the internet transfers greater power to communities on presuming the activities in the Web3 platform. Like any …

Earn Rewards, Make a Difference: QuillAudits Partnership & Affiliate Program Read More »

Proof of Reserve

The Ins And Outs Of Proof-of-Reserves

Read Time: 7 minutes The staggering implosion of FTX, one of the big leagues in the industry, created a tremor that reverberated last week. The market crisis is so deep that the prices of digital currencies were plummeting, with the impact being felt by the world’s biggest cryptocurrencies, such as Bitcoin and Ethereum.  With the crypto investors taken aback …

The Ins And Outs Of Proof-of-Reserves Read More »

MEV

A Guide To MEV: Critical Issues and Best Security Practices

Read Time: 6 minutes Profit-making is the ultimate aim behind any work that an individual performs. In regard to that, MEV, which stands for Maximal Extractable Value, signifies the profit a validator makes from a smart contract-enabled blockchain for including, excluding or re-ordering transactions in the blocks.  In short, MEV represents the measure of profits that a miner/validator could …

A Guide To MEV: Critical Issues and Best Security Practices Read More »

spoof tokens

Understanding Spoof Tokens and How to Avoid Being Coaxed

Read Time: 5 minutes The safety and security of assets heavily make a difference in how much money the users make from their investments. And so here’s a security blog to stay aware and informed in Web3. Cryptocurrencies are known for their volatility. That tells how much the asset’s price is influential in making investment decisions. There’s a catch …

Understanding Spoof Tokens and How to Avoid Being Coaxed Read More »

Become a Quiffiliate!
Join our mission to safeguard web3

Sounds Interesting, Right? All you have to do is:

1

Refer QuillAudits to Web3 projects for audits.

2

Earn rewards as we conclude the audits.

3

Thereby help us Secure web3 ecosystem.

Total Rewards Shared Out: $190K+