You’ve stumbled across a snippet of code that makes your Spidey-Senses tingle. You get excited. Could this be the bug that makes you a million dollars, turns you into a hall of fame legendary hacker, and changes your life forever?

But you’re not 100% sure. How can you tell if that potential vulnerability you just found is critical or non-critical?

You need to know if there’s a real issue at hand. You don’t want to sound the alarm bell for a false positive.

Enter the proof-of-concept (PoC) – and here's how you use a forked environment via Hardhat, to write a PoC for the Alchemix Access Control Exploit.

submitted by /u/tornadetornade
[link] [comments]

This post was originally published on this site