-
-
**Context:**
We know that security vulnerabilities are categorized as FuzzerSecurityIssueLow, Medium, High or Critical and is thrown by jazzer.
Hence these cannot be catched in the fuzz test.
**Q…
-
Sorry for the long post, I wanted to brain dump this stuff in case anyone else is interested.
#1712 got me thinking about .ksm files in general and why they are so gosh-darn big. In my experience the…
-
`(+ 1 "foo")` produces `"1foo"`. WTF?!?
Also note that `(sqrt -1)` produces `NaN`. This is more "Script" than "Racket".
-
# Problem
`mpif.h` was deprecated in 4.1. If I understand correctly, we do not need to worry about deprecated features anymore. This means that the ABI standardization effort can ignore `mpif.h`.…
-
-
-
## **Hermes Analysis**
### **Approach**
The process of auditing the Hermes protocol started with a review of the tokens implementation and management contracts. This included a review of the ERC…
-
## Historical background
Welcome to the 1970s.
Personal computers don't exist.
Computers look like this:
![image](https://user-images.githubusercontent.com/11392207/71781019-1b87b800-2fca-11…
-
Hi, I have a question regarding tracking labor cost. I wanted the discussion to be available so I thought it might be a good idea to create an issue. Let me know if you think somewhere else would be b…