Bounty - Inspecting On-Chain Functions Involving Calls
Learning Outcomes
By the end of this bounty, you will be able to understand how encode/call functions are used in actual deployed smart contracts.
Quest Details
Introduction
Note that this Bounty is over as it was only applicable on the Earn app. However, you are highly encouraged to still complete the bounty to practice your understanding.
In this bounty, we’ll be challenging you to look at smart contracts that’ve been deployed on-chain to see how the functions we’ve learnt about in Quests 1 and 3 are used. This bounty bridges the gap between classroom knowledge and real world experience!
Here’s what you’ll be tasked with: search for a function in a smart contract that’s been deployed on-chain that contains any of the encode/call functions we learnt about in the earlier quests and provide a short description on how the encode/call function is used in the context of that function.
For technical help on the StackUp platform & bounty-related questions, join our Discord, head to the 🏆 | bounty-helpdesk channel and look for the correct thread to ask your question.
Deliverables
This quest has 1 deliverable.
- Submit the URL to the markdown file containing your submission
This quest is part of a campaign so do check out other quests!
Find articles to support you through your journey or chat with our support team.
Help Center