-
Is the bot logic described in writing anywhere?
Does it primarily manage delta-neutral positions by picking highest funding rate?
-
A proposal to present an improved version of the get next order identifier API. An adapted version of its OpenAPI (written in YAML) definition can be found [here](https://github.com/Loopring/DEX-API/f…
-
Ok, this might just be a blog post on the website, or it could be something more exciting, but it would be good to have a way to collect together links to artists/makers that are connected to DoES and…
-
# Purpose:
The thumbnail image for the "SILK Women" guide must convey the brand's authenticity, diversity, sustainability, and empowerment. The goal is to replace it with an updated photo that be…
-
IRC was only ever intended as a starting point, eventually another messaging channel will be found because ultimately IRC will always been inferior. There are a few ideas for which p2p network to use,…
-
| Header 1 | Header 2 | Header 3 |
|------------|------------|------------|
| Row 1, Col 1 | Row 1, Col 2 | Row 1, Col 3 |
| Row 2, Col 1 | Row 2, Col 2 | Row 2, Col 3 |
| Row 3, Col 1 | Row…
-
- [ ] backup daemon should backup
```
drwx------ 3 root root 4096 Feb 26 20:24 tor
drwx------ 3 root root 4096 Feb 26 20:27 tor-data
-rw-r--r-- 1 root root 2183 Feb 26 19:51 xud.con…
-
As a data scientist at a provider of Business Intelligence (BI) to empower decision-makers,
I want to have continuous access to processed data (= information) via well-designed APIs
so that I …
-
cergyk
high
# Malicious trader can bypass utilization buffer
## Summary
A malicious trader can bypass the Utilisation buffer, and push utilisation to 1 on any product.
## Vulnerability Detail
Pere…
-
### Overview
- **Short Description:** Develop a mobile client (SDK) with Golang for Tinyman that is compatible with the go-mobile package.
- **Bounty:** 5,000 ALGO tokens (US residents will receiv…