<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>When coding is life... - Serial Coder</title>
        <link>https://www.serial-coder.com/</link>
        <description>When coding is life... - Serial Coder</description>
        <generator>Hugo -- gohugo.io</generator><language>en</language><managingEditor>mr.thummavet@gmail.com (Phuwanai Thummavet)</managingEditor>
            <webMaster>mr.thummavet@gmail.com (Phuwanai Thummavet)</webMaster><copyright>This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.</copyright><lastBuildDate>Wed, 08 Jan 2025 10:00:05 &#43;0700</lastBuildDate>
            <atom:link href="https://www.serial-coder.com/index.xml" rel="self" type="application/rss+xml" />
        <item>
    <title>Solidity Security By Example #13: Double Spending #2</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-13-double-spending-02/</link>
    <pubDate>Tue, 13 Jun 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-13-double-spending-02/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Double spending can happen due to improper smart contract design or incorrect implementation. Most of the time, the double spending vulnerability could be challenging to detect.]]></description>
</item><item>
    <title>Solidity Security By Example #12: Amplification Attack (Double Spending #1)</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-12-amplification-attack-double-spending-01/</link>
    <pubDate>Tue, 23 May 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-12-amplification-attack-double-spending-01/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. An amplification attack can happen when a smart contract is misdesigned, resulting in the contract being exploited.]]></description>
</item><item>
    <title>Solidity Security By Example #11: Denial of Service With Induction Variable Overflow</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-11-denial-of-service-with-induction-variable-overflow/</link>
    <pubDate>Wed, 26 Apr 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-11-denial-of-service-with-induction-variable-overflow/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Induction variable overflow can happen when a smart contract developer declares some variable with a too-small data type.]]></description>
</item><item>
    <title>ERC-4337 — Why Would This Change Ethereum To Mass Adoption?</title>
    <link>https://www.serial-coder.com/post/erc-4337-why-would-this-change-ethereum-to-mass-adoption/</link>
    <pubDate>Tue, 04 Apr 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/erc-4337-why-would-this-change-ethereum-to-mass-adoption/</guid>
    <description><![CDATA[Original photo by Kanchanara on Unsplash
  
Originally published in Coinmonks' Medium. This article will unveil why the ERC-4337 (Account Abstraction) will be the key to the mass adoption of Ethereum. It is the rewritten (and improved) version of my previous article written in Thai. Table of contents   At a glance
  What is ERC-4337? (in short, probably)
  Will the emergence of ERC-4337 lead to the centralized Ethereum?]]></description>
</item><item>
    <title>Solidity Security By Example #10: Denial of Service With Gas Limit</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-10-denial-of-service-with-gas-limit/</link>
    <pubDate>Tue, 28 Mar 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-10-denial-of-service-with-gas-limit/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Denial of service with gas limit is often caused by a lack of understanding of how the Ethereum Virtual Machine (EVM) works, resulting in the contract being exploited or the contract cannot operate expectedly.]]></description>
</item><item>
    <title>Solidity Security By Example #09: Denial of Service With Revert</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-09-denial-of-service-with-revert/</link>
    <pubDate>Wed, 15 Mar 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-09-denial-of-service-with-revert/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Denial of service with revert is often caused by a lack of understanding of how the Solidity smart contract works, resulting in the contract being exploited.]]></description>
</item><item>
    <title>ทำไม ERC-4337 (Account Abstraction Using Alt Mempool) จะเปลี่ยน Ethereum ไปสู่ Mass Adoption</title>
    <link>https://www.serial-coder.com/post/why-would-erc-4337-account-abstraction-change-ethereum-to-mass-adoption-th/</link>
    <pubDate>Thu, 09 Mar 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/why-would-erc-4337-account-abstraction-change-ethereum-to-mass-adoption-th/</guid>
    <description><![CDATA[Original photo by Zoltan Tasi on Unsplash
  
Originally published in my Medium. This article summarizes my thought on the ERC-4337 written in the Thai language. I may re-write this article in English in the future.  Disclaimer: เนื้อหาที่คุณกำลังอ่านเป็นการรวบรวม และปะติดปะต่อโดยใช้เวลาไม่ถึงหนึ่งวันในการ research ของผม ดังนั้นบทความนี้ไม่ควรถูกใช้เป็น reference ใดๆ เพราะข้อมูลอาจไม่ถูกต้อง 100% ครับ 👌 ที่สำคัญ บทความนี้ไม่ควรใช้ในการตัดสินใจลงทุนหรืออะไรทั้งสิ้น หลายๆส่วนเกิดจากการมโน หรือ bias ขึ้นมาครับ 😼
 
Table of contents   At a glance]]></description>
</item><item>
    <title>Solidity Security By Example #08: Unexpected Ether With Forcibly Sending Ether</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-08-unexpected-ether-with-forcibly-sending-ether/</link>
    <pubDate>Wed, 25 Jan 2023 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-08-unexpected-ether-with-forcibly-sending-ether/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments to the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Forcibly sending ether is an attacker&rsquo;s technique to manipulate a target contract balance. This article will describe how a smart contract relying on improper balance checking can be attacked and how to avoid the issue.]]></description>
</item><item>
    <title>Solidity Security By Example #07: Phishing With Improper Authorization</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-07-phishing-with-improper-authorization/</link>
    <pubDate>Wed, 23 Nov 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-07-phishing-with-improper-authorization/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Improper authorization is often caused by a lack of understanding of how the Solidity smart contract works, resulting in the contract being exploited.]]></description>
</item><item>
    <title>Solidity Security By Example #06: Integer Overflow</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-06-integer-overflow/</link>
    <pubDate>Wed, 05 Oct 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-06-integer-overflow/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Integer overflow might be one of the most commonly known issues in the smart contract security field.]]></description>
</item><item>
    <title>Solidity Security By Example #05: Cross-Contract Reentrancy</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-05-cross-contract-reentrancy/</link>
    <pubDate>Wed, 21 Sep 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-05-cross-contract-reentrancy/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Cross-contract reentrancy typically happens when multiple contracts share the same state variable, and some contracts update that variable insecurely.]]></description>
</item><item>
    <title>Solidity Security By Example #04: Cross-Function Reentrancy</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-04-cross-function-reentrancy/</link>
    <pubDate>Tue, 10 May 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-04-cross-function-reentrancy/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Cross-function reentrancy is another level of reentrancy in terms of complexity. Typically, the root cause of this issue is that there are multiple functions mutually sharing the same state variable, and some of them update that variable insecurely.]]></description>
</item><item>
    <title>Solidity Security By Example #03: Reentrancy via Modifier</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-03-reentrancy-via-modifier/</link>
    <pubDate>Wed, 20 Apr 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-03-reentrancy-via-modifier/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Reentrancy via modifier might be another level of reentrancy in terms of complexity. Sometimes, it might be challenging to catch up on this vulnerability in a smart contract.]]></description>
</item><item>
    <title>Solidity Security By Example #02: Reentrancy</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-02-reentrancy/</link>
    <pubDate>Tue, 05 Apr 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-02-reentrancy/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Reentrancy is one of the most famous attacks in the smart contract security field. The most famous example of reentrancy might be The DAO hack in 2016, causing the stealing of 3.]]></description>
</item><item>
    <title>Solidity Security By Example #01: Integer Underflow</title>
    <link>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-01-integer-underflow/</link>
    <pubDate>Wed, 23 Mar 2022 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/solidity-smart-contract-security-by-example-01-integer-underflow/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. Smart contract security is one of the biggest impediments toward the mass adoption of the blockchain. For this reason, we are proud to present this series of articles regarding Solidity smart contract security to educate and improve the knowledge in this domain to the public. Integer underflow, one of the most commonly known issues in the smart contract security field, will be explained in this article.]]></description>
</item><item>
    <title>Twindex — Full Incident Analysis of Flash Loan and Price Oracle Manipulation Attacks</title>
    <link>https://www.serial-coder.com/post/twindex-full-incident-analysis-of-flash-loan-and-price-oracle-manipulation-attacks/</link>
    <pubDate>Thu, 14 Oct 2021 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/twindex-full-incident-analysis-of-flash-loan-and-price-oracle-manipulation-attacks/</guid>
    <description><![CDATA[Originally published in Valix Consulting&rsquo;s Medium. This report analyzes the incident of Twindex’s fractional-algorithmic synthetic asset system exploited on October 2, 2021. We provide a full analysis explaining all attack details. Moreover, we also give remediation solutions to address issues in this report. Table of Contents   TLDR
  How Does the Twindex’s Fractional-Algorithmic Synthetic Asset Work?
  Associated Addresses
  Associated Transactions]]></description>
</item><item>
    <title>Poly Network — In-Depth Analysis of the Biggest Heist in DeFi History</title>
    <link>https://www.serial-coder.com/post/poly-network-in-depth-analysis-of-the-biggest-heist-in-defi-history/</link>
    <pubDate>Thu, 02 Sep 2021 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/poly-network-in-depth-analysis-of-the-biggest-heist-in-defi-history/</guid>
    <description><![CDATA[--   
Originally published in Valix Consulting&rsquo;s Medium. .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  -- This report provides an in-depth analysis of the Poly Network’s heist incident on August 10, 2021. The heist affected the user assets worth more than $610M, breaking the record to become the biggest heist in DeFi history. In this report, we provide a comprehensive analysis and give our recommended remediation in the end.]]></description>
</item><item>
    <title>SushiSwap — Voting Vulnerability of SUSHI Token (and Its Forks)</title>
    <link>https://www.serial-coder.com/post/sushiswap-voting-vulnerability-of-sushi-token-and-its-forks/</link>
    <pubDate>Tue, 17 Aug 2021 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/sushiswap-voting-vulnerability-of-sushi-token-and-its-forks/</guid>
    <description><![CDATA[--   
Originally published in Valix Consulting&rsquo;s Medium. .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  -- This report exposes our findings toward the design flaws under the inherent voting mechanism of the SUSHI token, which can also affect every forked project to be attacked. We also give solutions to remediating its issues in the end. Table of Contents   TLDR
  Overview of SUSHI Token&rsquo;s Voting Functionality]]></description>
</item><item>
    <title>Biswap — Discovery of Critical Vulnerability on Biswap’s swap() Function</title>
    <link>https://www.serial-coder.com/post/biswap-discovery-of-critical-vulnerability-on-biswaps-swap-function/</link>
    <pubDate>Wed, 14 Jul 2021 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/biswap-discovery-of-critical-vulnerability-on-biswaps-swap-function/</guid>
    <description><![CDATA[--   
Originally published in Valix Consulting&rsquo;s Medium. .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  -- On 21 Jun 2021, Valix Consulting has found a critical vulnerability issue on the swap function of Biswap. After our investigation, we contacted Biswap to inform the issue right away. And, the issue has already been resolved before we publish this report. You can find the issue details below. The remaining of this report is organized as follows.]]></description>
</item><item>
    <title>Merlin Lab — Incident Case Analysis</title>
    <link>https://www.serial-coder.com/post/merlin-lab-incident-case-analysis/</link>
    <pubDate>Tue, 06 Jul 2021 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/merlin-lab-incident-case-analysis/</guid>
    <description><![CDATA[--   
Originally published in Valix Consulting&rsquo;s Medium. .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  -- This report analyzes the incident of Merlin Lab exploited on Jun-29–2021 01:38:21 AM +UTC. On Jun-28–2021 11:46:36 AM +UTC, Merlin deployed a new strategy for Alpaca-BNB, called MerlinStrategyAlpacaBNB. The attack then began after 14 hours of the strategy deployment. Table of Contents   TLDR
  Associated Addresses
  Incident Analysis]]></description>
</item><item>
    <title>Demystifying Hyperledger Fabric (3/3): Network Traffic Handling, Service Discovery, and Operations Service</title>
    <link>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-network-traffic-handling-service-discovery-and-operations-service/</link>
    <pubDate>Tue, 04 Jun 2019 10:00:03 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-network-traffic-handling-service-discovery-and-operations-service/</guid>
    <description><![CDATA[-- [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --  [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --   www.hyperledger.org/projects/fabric
  
Welcome to the 3rd article which is the final article of Demystifying Hyperledger Fabric series. In the 1st article, the underlying architecture of Hyperledger Fabric has been explained. The 2nd article describes one of the important features of the Fabric called private data collection. I would like to dedicate this article to discuss some of the facilitating supplementary services in Hyperledger Fabric including the following topics: Network Traffic Handling, Service Discovery, and Operations Service.]]></description>
</item><item>
    <title>Demystifying Hyperledger Fabric (2/3): Private Data Collection</title>
    <link>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-private-data-collection/</link>
    <pubDate>Wed, 15 May 2019 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-private-data-collection/</guid>
    <description><![CDATA[-- [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --  [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --   www.hyperledger.org/projects/fabric
  
Welcome to the 2nd article of Demystifying Hyperledger Fabric series. This article assumes that the reader has knowledge about Hyperledger Fabric architecture already. In case you have come across this article, I recommend you to check out the previous article first. In the previous article, you have learned the essential architecture of Hyperledger Fabric.]]></description>
</item><item>
    <title>Demystifying Hyperledger Fabric (1/3): Fabric Architecture</title>
    <link>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-fabric-architecture/</link>
    <pubDate>Thu, 02 May 2019 10:00:01 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/demystifying-hyperledger-fabric-fabric-architecture/</guid>
    <description><![CDATA[--    www.hyperledger.org/projects/fabric     --      -- [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --  [www.hyperledger.org/projects/fabric](https://www.hyperledger.org/projects/fabric)  --   www.hyperledger.org/projects/fabric
  
When it comes to the private blockchain, Hyperledger Fabric might be one of the most popular and adopted blockchain frameworks. Hyperledger Fabric has been adopted in several industry use cases such as education, healthcare, IoT, logistics, supply chain, and etc.]]></description>
</item><item>
    <title>Architecture Design of Ethereum-Based Private Katinrun Foundation Token</title>
    <link>https://www.serial-coder.com/post/pktf-architecture-design-of-ethereum-based-private-katinrun-foundation-token/</link>
    <pubDate>Wed, 23 Jan 2019 00:00:00 &#43;0000</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pktf-architecture-design-of-ethereum-based-private-katinrun-foundation-token/</guid>
    <description><![CDATA[--      --      .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  -- 
Last updated: January 28, 2019

Synopsis on Katinrun Platform 
Katinrun is the first open source blockchain community in Thailand. We are developing an Ethereum-based donation platform where a donee who needs some support and a donor who wants to give support can meet together. We are aiming at creating a donation platform that provides transparency and accountability to every donation campaign.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #6 ] Integrating PizzaCoin Contract with Dependencies</title>
    <link>https://www.serial-coder.com/post/pizza-coin-integrating-pizzacoin-contract-with-dependencies/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:06 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-integrating-pizzacoin-contract-with-dependencies/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Welcome to the final part of PizzaCoin the Series. In the previous article, you have learned how PizzaCoin contract deploys its children contracts using a contract-factory pattern. In this article, you will learn how PizzaCoin contract was implemented in order to integrate and interact with its dependency components.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #5 ] Deploying Children Contracts with Contract Factories</title>
    <link>https://www.serial-coder.com/post/pizza-coin-deploying-children-contracts-with-contract-factories/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-deploying-children-contracts-with-contract-factories/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Welcome to the 5th part of PizzaCoin the Series. Previously, you have learned how PizzaCoinStaff and PizzaCoinPlayer contracts were developed in the 3rd article. The development details of PizzaCoinTeam contract has been discussed in the 4th article.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #4 ] Detailed Implementation of Team Contract</title>
    <link>https://www.serial-coder.com/post/pizza-coin-detailed-implementation-of-team-contract/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:04 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-detailed-implementation-of-team-contract/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Welcome to the 4th part of PizzaCoin the Series. In the previous article, you have learned how PizzaCoinStaff and PizzaCoinPlayer contracts were implemented. In this article, you will learn the implementation of another child of PizzaCoin contract called PizzaCoinTeam.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #3 ] Detailed Implementation of Staff and Player Contracts</title>
    <link>https://www.serial-coder.com/post/pizza-coin-detailed-implementation-of-staff-and-player-contracts/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:03 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-detailed-implementation-of-staff-and-player-contracts/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Welcome to the 3rd part of PizzaCoin the Series. In the previous article, you have been walked through the workflow design of PizzaCoin voting system. You have seen that the system composes of nine components including PizzaCoin (mother) contract, PizzaCoinStaff contract, PizzaCoinPlayer contract, PizzaCoinTeam contract, PizzaCoinStaffDeployer library, PizzaCoinPlayerDeployer library, PizzaCoinTeamDeployer library, PizzaCoinCodeLib library and PizzaCoinCodeLib2 library.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #2 ] Workflow Design for PizzaCoin Voting System</title>
    <link>https://www.serial-coder.com/post/pizza-coin-workflow-design-for-pizzacoin-voting-system/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-workflow-design-for-pizzacoin-voting-system/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Welcome to the 2nd part of PizzaCoin the Series. Before deep diving into the code, we would like to walk you through an overview of workflow design for PizzaCoin contract. As mentioned in the previous article, one of the biggest challenges when developing Ethereum smart contract is a way to handling &lsquo;Out-of-Gas&rsquo; error while deploying the contract to the blockchain network, due to some block gas limits on Ethereum blockchain.]]></description>
</item><item>
    <title>[ PizzaCoin the Series #1 ] How Did We Develop Ethereum-based Voting System for Pizza Hackathon?</title>
    <link>https://www.serial-coder.com/post/pizza-coin-how-did-we-develop-ethereum-based-voting-system-for-pizza-hackathon/</link>
    <pubDate>Tue, 23 Oct 2018 10:00:01 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/post/pizza-coin-how-did-we-develop-ethereum-based-voting-system-for-pizza-hackathon/</guid>
    <description><![CDATA[Figure 1. Pizza Hackathon 2018     --  Figure 1. Pizza Hackathon 2018   --       Figure 1. Pizza Hackathon 2018  --   Figure 1. Pizza Hackathon 2018
  
Recently, I got an opportunity to be one of staff members who organized the event called Pizza Hackathon. Pizza Hackathon was the 1st blockchain hackathon event in Thailand which was held on 25-26 August 2018.]]></description>
</item><item>
    <title>[ Project #5 ] Katinrun Fundraising Platform</title>
    <link>https://www.serial-coder.com/project/katinrun-fundraising-platform/</link>
    <pubDate>Wed, 26 Jun 2019 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/project/katinrun-fundraising-platform/</guid>
    <description><![CDATA[Description: Decentralized donation platform for the world charity on Blockchain awarded from Surge Bangkok Hackathon 2019
 
Details 
1. [Devpost] - Katinrun Fundraising Platform
 https://devpost.com/software/katinrun-fundraising-platform   2. [Repo] - Vue.js front-end, Node.js back-end and Ethereum smart contract
 https://github.com/kulapio/surge-hack-fundraising-platform   3. [Blog] - โปรเจคระดมทุน Katinrun Fundraising Platform เพื่อสังคมที่ดีขึ้น
 https://medium.com/kulapofficial/โปรเจคระดมทุน-katinrun-fundraising-platform-เพื่อสังคมที่ดีขึ้น-cb0521b4da4e
  4. [Slide] - [Surge Bangkok 2019] Katinrun Fundraising Platform
 --]]></description>
</item><item>
    <title>[ Project #4 ] Chair Auction Platform</title>
    <link>https://www.serial-coder.com/project/chair-auction/</link>
    <pubDate>Sun, 21 Apr 2019 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/project/chair-auction/</guid>
    <description><![CDATA[Description: The blockchain-based auction platform awarded from The Stupid Hackathon Thailand #3
 
Details 
1. [Repo] - Auction Front Page (React.js)
 https://github.com/kulapio/stupid-hack-auction-chair   2. [Repo] - Real-time Auction Results Display (Vue.js)
 https://github.com/kulapio/stupid-hack-leader-board   3. [Repo] - Off-chain Auction Queue Service (Express.js + PostgreSQL)
 https://github.com/kulapio/stupid-hack-auction-queue-service   4. [PRIVATE Repo] - Blockchain-based Auction Platform (Hyperledger Fabric)
5. [Blog] - “ทีมขอแชร์นะครับ” ในงาน The Stupid Hackathon ครั้งที่ 3]]></description>
</item><item>
    <title>[ Project #3 ] Katinrun Platform</title>
    <link>https://www.serial-coder.com/project/katinrun/</link>
    <pubDate>Sat, 26 Jan 2019 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/project/katinrun/</guid>
    <description><![CDATA[Description: The first blockchain-based donation platform in Thailand
 
Details 
1. [Repo] - Private Katinrun Foundation Token
 https://github.com/KatinrunFoundation/PKTF   2. [Blog]
 Architecture Design of Ethereum-Based Private Katinrun Foundation Token
  
 .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  Activity Gallery -- Activity Gallery]]></description>
</item><item>
    <title>[ Project #2 ] RTHB-ThaiBahtCoin</title>
    <link>https://www.serial-coder.com/project/rthb-thaibahtcoin/</link>
    <pubDate>Fri, 14 Dec 2018 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/project/rthb-thaibahtcoin/</guid>
    <description><![CDATA[Description: Thai Baht Stablecoin developed for running on RootStock (RSK) smart contract platform (and also Ethereum platform)
 
Details 
1. [Repo] - RTHB Ethereum-based Smart Contract + React Front-end + Internet of Things (IoT)
 https://github.com/kulapio/RTHB-ThaiBahtCoin   2. [Repo] - RTHB Ethereum-based Smart Contract Only
 https://github.com/serial-coder/RTHB-ThaiBahtCoin   3. [Blog] - RTHB — Thai Baht Stablecoin in the 1st RSK Hackathon in Bangkok
 https://medium.com/kulapofficial/rthb-thai-baht-stable-coin-in-the-1st-rsk-hackathon-in-bangkok-3598dd62be8a]]></description>
</item><item>
    <title>[ Project #1 ] PizzaCoin Ethereum-based Voting System</title>
    <link>https://www.serial-coder.com/project/pizza-coin/</link>
    <pubDate>Tue, 24 Jul 2018 10:00:01 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/project/pizza-coin/</guid>
    <description><![CDATA[Description: PizzaCoin voting system developed for the 1st Thailand&rsquo;s blockchain hackathon (Pizza Hackathon 2018)
 
Details 
1. [Repo] - PizzaCoin Ethereum-based Smart Contract + Decentralized Application (DApp)
 https://github.com/pizzahackathon/PizzaCoin   2. [Repo] - PizzaCoin Ethereum-based Smart Contract Only
 https://github.com/serial-coder/Pizza-Coin   3. [Blog] - PizzaCoin the series consists of 6 articles as follows
  Part 1: How Did We Develop Ethereum-based Voting System for Pizza Hackathon?]]></description>
</item><item>
    <title>[ Interview #1 ] The Path to Smart Contract Auditing: My Interview with DittoETH</title>
    <link>https://www.serial-coder.com/misc/the-path-to-smart-contract-auditing-my-interview-with-dittoeth/</link>
    <pubDate>Wed, 08 Jan 2025 10:00:05 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/the-path-to-smart-contract-auditing-my-interview-with-dittoeth/</guid>
    <description><![CDATA[Originally published at https://dittoeth.com/interviews/5_phuwanai. Hey everyone, long time no see! 🙋‍♂️ In late November last year, I was interviewed by DittoETH, one of my auditing sponsors for the Code4rena public and invitational audit contests. 🙏 The interview covers my career journey as a smart contract auditor 🕵️‍♂️ and other ad-hoc topics. It was great, and I want to share it with you. If you are a smart contract auditor or want to become one, this interview might be worth reading.]]></description>
</item><item>
    <title>[ Audit Reports ] My Smart Contract Audit Reports and Consultations at Valix Consulting</title>
    <link>https://www.serial-coder.com/misc/my-smart-contract-audit-reports-and-consultations-at-valix-consulting/</link>
    <pubDate>Fri, 16 Jun 2023 08:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/my-smart-contract-audit-reports-and-consultations-at-valix-consulting/</guid>
    <description><![CDATA[Description: My smart contract audit reports and consultations at Valix Consulting. Only public reports/consultations are listed here. Several of my audit reports/consultations are private.
 
Audit Reports (Public-Only) [Test2]-Mint-Fee-Constant (new tab) (2021-08-13) test (2021-08-13) | -- ANIV721Land (2022-09-21) **View on this web** **View on Valix's GitHub**   -- ANIV721Land (2022-09-21) **View on this web** **View on Valix's GitHub**   | | [**Code Sekai**](https://codesekai.com/) | NFT Minting & Transferring In-game/Out-game v1.]]></description>
</item><item>
    <title>[ Presentation #5 ] Dev Mountain Tech Festival 2022 - Hacking The (Smart) Contract</title>
    <link>https://www.serial-coder.com/misc/dev-mountain-tech-festival-2022-hacking-the-smart-contract/</link>
    <pubDate>Sat, 19 Mar 2022 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/dev-mountain-tech-festival-2022-hacking-the-smart-contract/</guid>
    <description><![CDATA[--  Description: The presentation in Dev Mountain Tech Festival 2022
 
Details 
1. Recorded Live - Hacking The (Smart) Contract
   
2. Slide - Hacking The (Smart) Contract
      Click the following link to download the slide: 👉 👉 Hacking The (Smart) Contract

3. Review Articles
 3.1: Parichaya Thanawuthikrai - สรุป Hacking The (Smart) Contract @Dev Mountain Tech Festival]]></description>
</item><item>
    <title>[ Presentation #4 ] SPARK STSP Innovation Fair 2022 - Blockchain x Cryptocurrency ใช้อย่างไรให้ธุรกิจ Work</title>
    <link>https://www.serial-coder.com/misc/spark-stsp-innovation-fair-2022-blockchain-x-cryptocurrency/</link>
    <pubDate>Sun, 27 Feb 2022 08:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/spark-stsp-innovation-fair-2022-blockchain-x-cryptocurrency/</guid>
    <description><![CDATA[Description: The presentation in SPARK STSP Innovation Fair 2022
 
Details 
1. Slide - Blockchain x Cryptocurrency ใช้อย่างไรให้ธุรกิจ Work
 --   
2. Recorded Live - Blockchain x Cryptocurrency ใช้อย่างไรให้ธุรกิจ Work
      Click the following link to watch the recorded live: 👉 👉 กิจกรรมเสวนา เรื่อง &ldquo;Blockchain x Cryptocurrency ใช้อย่างไรให้ธุรกิจ Work&rdquo;
 --   -- 
3. Links
 3.1: อุทยานวิทยาศาสตร์ภาคใต้ - SPARK STSP Innovation Fair 2022 &ldquo;Better Southern Life&rdquo;]]></description>
</item><item>
    <title>[ Podcast #1 ] BitCast EP14 - มารู้จัก Hyperledger ผ่านประสบการณ์นักพัฒนา Blockchain กับ Phuwanai Thummavet (Bright)</title>
    <link>https://www.serial-coder.com/misc/podcast-thaibitcast-hyperledger-fabric-v2-interview/</link>
    <pubDate>Mon, 03 Feb 2020 08:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/podcast-thaibitcast-hyperledger-fabric-v2-interview/</guid>
    <description><![CDATA[Description: My interview podcast regarding Hyperledger Fabric v2.0 and other permissioned blockchains
 
Details 
1. Podcast - มารู้จัก Hyperledger ผ่านประสบการณ์นักพัฒนา Blockchain กับ Phuwanai Thummavet (Bright)
   
2. Topics
  Hyperledger คืออะไร ต่างจาก Ethereum ยังไงบ้าง
  Infrastructure ของ Hyperledger ประกอบไปด้วยอะไรบ้าง
  Hyperledger 2.0 มีอะไรแก้ไขไปบ้าง
  ในแง่ของ Permissioned Blockchain มีใครเป็นคู่แข่งกับ Hyperledger บ้าง เรามีประสบการณ์ตัวไหน ข้อดี ข้อเสียแต่ละตัวเป็นยังไงบ้าง
  แนะนำคนที่กำลังศึกษาอยู่ว่า ถ้าจะเริ่มควรเริ่มยังไงบ้าง]]></description>
</item><item>
    <title>[ Presentation #3 ] Code Mania 1010 - Demystifying Hyperledger Fabric Blockchain with Example DApp</title>
    <link>https://www.serial-coder.com/misc/code-mania-1010-demystifying-hyperledger-fabric-blockchain-with-example-dapp/</link>
    <pubDate>Mon, 16 Dec 2019 08:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/code-mania-1010-demystifying-hyperledger-fabric-blockchain-with-example-dapp/</guid>
    <description><![CDATA[Description: The presentation in Code Mania 1010
 
Details 
1. Slide - Demystifying Hyperledger Fabric Blockchain with Example DApp
 --   
2. Links
 2.1: Digital Skill - Code Mania 1010: All About Passion!
 2.2: สมาคมโปรแกรมเมอร์ไทย - Code Mania 1010: All About Passion!

 .&nbsp;&nbsp;&nbsp;&nbsp;.&nbsp;&nbsp;&nbsp;&nbsp;.  Activity Gallery -- Activity Gallery]]></description>
</item><item>
    <title>[ Presentation #2 ] G-Able Tech Day 2019 - Understanding Private Blockchain by Use Cases and Example DApp</title>
    <link>https://www.serial-coder.com/misc/g-able-tech-day-2019-understanding-private-blockchain-by-use-cases-and-example-dapp/</link>
    <pubDate>Fri, 15 Nov 2019 08:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/g-able-tech-day-2019-understanding-private-blockchain-by-use-cases-and-example-dapp/</guid>
    <description><![CDATA[Description: The presentation in G-Able Tech Day 2019
 
Details 
Slide - Understanding Private Blockchain by Use Cases and Example DApp
 --]]></description>
</item><item>
    <title>[ Presentation #1 ] Libra Developer Meeting #1 - Deep dive into LibraBFT consensus</title>
    <link>https://www.serial-coder.com/misc/libra-developer-meeting-1-deep-dive-into-librabft-consensus/</link>
    <pubDate>Wed, 24 Jul 2019 10:00:02 &#43;0700</pubDate>
    <author>Author</author>
    <guid>https://www.serial-coder.com/misc/libra-developer-meeting-1-deep-dive-into-librabft-consensus/</guid>
    <description><![CDATA[--  Description: The presentation in Libra Developer Meeting #1 in Thailand
 
Details 
1. Slide - Deep dive into LibraBFT consensus
    --  --   
2. Recorded Lives
2.1 Part 1 by Tencent Thailand Open House
  --   
 -- 2.2 Part 2 by Tencent Thailand Open House
  --]]></description>
</item></channel>
</rss>
