- Vanilla Based Sequencing - Layer 2 - Ethereum Research
- Based Espresso: ad-hoc shared sequencing for all L2s, from based rollups to validiums - HackMD
- Based rollups—superpowers from L1 sequencing - Layer 2 - Ethereum Research
- Based preconfirmations - Layer 2 - Ethereum Research
- Taiko Protocol Overview — Taiko Labs
- Transaction Submission on Based Rollups - Layer 2 - Ethereum Research
- The Espresso Sequencer - HackMD
- How do layer 2s really differ from execution sharding?
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[package] | |
name = "hookable" | |
version = "0.1.0" | |
edition = "2021" | |
[dependencies] | |
eyre = "0.6.12" | |
tokio = { version = "1.38.0", features = ["full"] } | |
slog = "2.7.0" |
- F. D'Amato and M. Neuder. "Equivocation attacks in mev-boost and ePBS" Ethereum Research. https://ethresear.ch/t/equivocation-attacks-in-mev-boost-and-epbs/15338 (accessed May 15, 2023).
- R. Miller. "Post mortem: April 3rd, 2023 mev-boost relay incident and related timing issue." The Flashbots Collective. https://collective.flashbots.net/t/post-mortem-april-3rd-2023-mev-boost-relay-incident-and-related-timing-issue/1540 (accessed May 15, 2023).
- M. Sproul. "Unbundling attacks on MEV relays using RPC" Lighthouse Blog. https://lighthouse-blog.sigmaprime.io/mev-unbundling-rpc.html (accessed May 11, 2023).
- D. Marzec and L. Thibault. "Subverting the total eclipse (of the heart)" HackMD. [https://hackmd.io/@dmarz/total-eclipse-o
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
digraph asset_graph { | |
node [shape = circle] "GBP" "USD" "JPY" ; | |
"GBP" -> "USD" [label = "1.25"]; | |
"JPY" -> "GBP" [label = "0.01"]; | |
"USD" -> "JPY" [label = "76.92307692307692"]; | |
"USD" -> "GBP" [label = "0.8"]; | |
"GBP" -> "JPY" [label = "100"]; | |
"JPY" -> "USD" [label = "0.013"]; | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[package] | |
name = "uniswap_v2_prices" | |
edition = "2021" | |
[dependencies] | |
alloy = { git = "https://github.com/alloy-rs/alloy", features = [ | |
"contract", | |
"network", | |
"providers", | |
"rpc", |
reth::main
Cli::parse_args
Cli::run
NodeCommand::execute
(outbound)main::{closure}
WithLaunchContext::launch_node
- [`WithLaunchContext::laun
sequenceDiagram
actor Searcher
actor Builder
actor Relay
actor Proposer
Note over Searcher,Builder: Custom API
Note over Builder,Relay: Relay API
Note over Relay,Proposer: Builder API
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
use std::{convert::AsRef, env, fmt, fs::read_to_string}; | |
use sha2::{Digest as ShaDigest, Sha256}; | |
pub type Bytes = Vec<u8>; | |
#[derive(Clone, Debug)] | |
pub struct Plaintext(pub Bytes); | |
impl AsRef<[u8]> for Plaintext { |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
let top_val: serde_json::Value = serde_json::from_str(raw.as_ref())?; | |
let inner_val: &serde_json::Value = top_val | |
.get( | |
top_val | |
.as_object() | |
.unwrap() | |
.keys() | |
.collect::<Vec<_>>() | |
.first() | |
.unwrap(), |
$ heimdall disassemble --rpc-url https://polygon.llamarpc.com 0x45068ef2273a928a9b092c5e41cdca1672ebc6921355deb3dcc5ae7b9a43db11
$ cat output/137/0x45068ef2273a928a9b092c5e41cdca1672ebc6921355deb3dcc5ae7b9a43db11/disassembled.asm
000000 GASLIMIT
000001 MOD
000002 DUP15
000003 CALLCODE
000004 unknown
NewerOlder