You’ve stumbled across a snippet of code that makes your Spidey-Senses tingle. You get excited. Could this be the bug that makes you a million dollars, turns you into a hall of fame legendary hacker, and changes your life forever?
But you’re not 100% sure. How can you tell if that potential vulnerability you just found is critical or non-critical?
You need to know if there’s a real issue at hand. You don’t want to sound the alarm bell for a false positive.
Enter the proof-of-concept (PoC) – and here's how you use a forked environment via Hardhat, to write a PoC for the Alchemix Access Control Exploit.