June 15, 2025

How to Get Into Blockchain Security: The No-Bullshit Guide

Introduction: What The Gurus Won’t Tell You

You wanted to be a blockchain developer. That’s cool.

But then you noticed something peculiar: There are people who audit smart contracts for a living, and they make serious money. Like $100k+ annually, sometimes more per audit.

So naturally, you thought: “I want that.”

You searched Google. And found:

  • $5000 courses promising “Become a Security Expert in 30 Days”
  • Bootcamps saying you need 6 months of intensive study
  • Twitter posts claiming “I made $500k finding bugs last year”
  • Reddit threads warning you need a PhD in cryptography
  • Articles saying the market is saturated and you’re too late

Here’s what’s actually true:

None of that.

You don’t need $5000. You don’t need 6 months of bootcamp. You don’t need a PhD. The market isn’t saturated if you’re actually good. And that Twitter person probably got lucky or already had experience.

What you actually need:

  1. Structured knowledge (not everything, just the right things)
  2. Real practice (auditing actual contracts with bugs)
  3. A reading habit (understanding how real exploits work)
  4. Consistency (not intensity)
  5. Realistic expectations (3-6 months minimum, not 30 days)

I’ve audited smart contracts professionally for years. I’ve found exploits worth millions. I’ve also failed audits. I’ve learned what works and what’s a waste of time.

This is that accumulated knowledge, distilled into a roadmap.


Part 1: The Intelligence Trap (Why 90% Fail Without Knowing It)

The Two Approaches (Only One Works)

There are two ways people attempt to become auditors:

Approach A: The Academic Route

Month 1: Read "Mastering Ethereum" (500+ pages)
Month 2: Watch 50 hours of blockchain tutorials
Month 3: Study ZK proofs, MEV, advanced cryptography
Month 4: Audit their first real contract
Result: Can discuss blockchain theory brilliantly
         But misses obvious security bugs
         Gives up because it feels impossible

Approach B: The Practitioner Route

Week 1-2: Learn Solidity basics (what you ACTUALLY need)
Week 3: Do first security challenge (lose badly)
Week 4-8: Do 3-4 more challenges, starting to see patterns
Week 9-12: Finding bugs, understanding the "why"
Month 4+: Actually auditing with confidence
Result: Sees vulnerabilities naturally
        Keeps getting better
        Making money

The brutal truth: Approach A makes you sound smart. Approach B makes you actually good.

Guess which one pays?

Why Knowledge Alone Fails

Here’s the cognitive science: Your brain doesn’t retain abstract information. It retains patterns experienced.

When you read “reentrancy attacks,” your brain stores a fact.

When you find a reentrancy vulnerability yourself in a contest, your brain stores a pattern. Forever.

Same information. Completely different neural encoding.

This is why: People who learn theoretically plateau. People who learn practically keep improving.


Part 2: The Knowledge Stack (What To Learn, What To Skip)

The Brutally Honest Knowledge Map

Not all knowledge is equal. Some is critical, some is nice-to-have, some is a complete waste of time.

Here’s the honest breakdown:

┌─────────────────────────────────────────────────────────────┐
│            BLOCKCHAIN SECURITY KNOWLEDGE MAP                │
├─────────────────────────────────────────────────────────────┤
│                                                             │
│  CRITICAL (Learn In Month 1)                             │
│  ├─ Solidity basics (types, functions, state)              │
│  ├─ Common vulnerabilities (reentrancy, overflow, access)  │
│  ├─ Gas mechanics (why it matters for security)            │
│  └─ Testing patterns (how to catch bugs)                   │
│                                                             │
│  IMPORTANT (Learn In Month 2-3)                          │
│  ├─ DeFi mechanics (how protocols actually work)           │
│  ├─ Attack vectors (flash loans, oracles, MEV)             │
│  ├─ Audit methodology (the process, not just tools)        │
│  └─ Real exploit case studies                              │
│                                                             │
│  USEFUL (Learn When You Need It)                         │
│  ├─ EVM bytecode (for advanced analysis)                   │
│  ├─ Formal verification (for critical systems)             │
│  ├─ Cryptography (unless doing crypto-specific work)       │
│  └─ Economics modeling (if auditing financial protocols)   │
│                                                             │
│  DISTRACTION (Skip Unless Obsessed)                      │
│  ├─ Complete Ethereum architecture                         │
│  ├─ Layer 2 internals                                      │
│  ├─ Consensus mechanisms (not needed for auditing)         │
│  ├─ Mining economics                                       │
│  └─ ZK-SNARKs (unless specialized in ZK)                   │
│                                                             │
└─────────────────────────────────────────────────────────────┘

What You MUST Know (The Non-Negotiable List)

By End of Week 2:

✅ Solidity Fundamentals
   • Data types (uint256, address, bool, bytes32)
   • Variables (state, local, storage vs memory)
   • Mappings and arrays (the bread and butter)
   • Functions and modifiers (how execution flows)
   • Events (how to track changes)

✅ Transaction Basics
   • msg.sender, msg.value, tx.origin (who's calling?)
   • require(), revert(), assert() (validations)
   • External calls (the danger zone)
   • State changes and their order

✅ Testing Concepts
   • Unit tests (does this function work?)
   • Integration tests (do functions work together?)
   • Edge cases (what about 0? What about max?)

Resources for Week 2:

  • OpenZeppelin Docs (30 minutes per concept)
  • Remix IDE playground (hands-on, in browser)
  • CryptoZombies Levels 1-4 (gamified, fun)
  • One good Solidity cheat sheet

Total Time: 40-50 hours


By End of Week 3:

✅ Security Fundamentals
   • Reentrancy (why transaction order matters)
   • Integer overflow/underflow (math goes boom)
   • Access control (who can call what)
   • Timestamp dependency (blocks aren't precise)
   • Delegatecall dangers (context switching)

✅ Common Attack Vectors
   • Flash loan attacks (unlimited free money)
   • Oracle manipulation (lying about prices)
   • Front-running (seeing transactions before others)
   • Sandwich attacks (profiting from reordering)

✅ Audit Tools Introduction
   • Slither (automated vulnerability scanner)
   • Remix debugger (stepping through code)
   • Etherscan (reading deployed contracts)

Resources for Week 3:

  • Trail of Bits blog (top 5 articles)
  • Rekt.news (real hack post-mortems)
  • OpenZeppelin security blog
  • One good “common vulnerabilities” guide

Total Time: 20-30 hours


What You DON’T Need Yet (And Why)

❌ EVM BYTECODE
   Why: You can audit at the Solidity level perfectly fine
   When: Learn this in Month 6+ if interested
   Exception: If doing low-level security, come back later

❌ CRYPTOGRAPHY DEEP DIVES
   Why: 95% of audits don't require it
   When: Learn if you specialize in ZK or crypto
   Exception: Basic hashing and signatures ok to know

❌ MEV DEEP DIVES
   Why: Important but not for Month 1
   When: Learn in Month 3+ as you specialize
   Exception: Know it exists, understand sandwich attacks

❌ FORMAL VERIFICATION
   Why: Too complex for beginners, not practical for most
   When: Learn if auditing $1B+ protocols
   Exception: Understand the concept exists

❌ LAYER 2 ARCHITECTURE
   Why: You can audit contracts on any chain without knowing internals
   When: Learn if specializing in L2 security
   Exception: Understand rollups exist

The pattern: Learn the minimum viable knowledge, then go practice. Knowledge expands naturally when you need it.


Part 3: The Contest-Driven Learning Model (Your Real Education)

Why Contests Are Your Secret Weapon

Auditing firms train new auditors through a specific method: guided vulnerability hunting.

They don’t say “read these 50 documents.” They say “find the bug in this contract, I’ll check your work.”

This is exactly what contests do.

A security contest is:

  • A smart contract with intentional bugs (sometimes multiple)
  • A time limit (usually hours, sometimes days)
  • A way to compare your findings with others
  • Real feedback on what you missed

This is superior to any course because:

  1. You engage with real code under pressure
  2. You get immediate feedback
  3. You see multiple correct interpretations
  4. Your brain builds actual patterns

The Contest Progression Path

┌─────────────────────────────────────────────────────────┐
│          CONTEST PROGRESSION (Week-by-Week)            │
├─────────────────────────────────────────────────────────┤
│                                                         │
│  WEEK 1-2: ETHERNAUT (OpenZeppelin)                     │
│  ├─ What: 25+ gamified security challenges              │
│  ├─ Difficulty: 1-3 (very beginner friendly)            │
│  ├─ Time per level: 15-30 minutes                       │
│  ├─ Do: First 8 levels minimum                          │
│  └─ Result: "I can find obvious bugs"                   │
│                                                         │
│  WEEK 3-4: ETHERNAUT ADVANCED                           │
│  ├─ What: Levels 9-20 (getting harder)                  │
│  ├─ Difficulty: 4-6                                     │
│  ├─ Time per level: 30-60 minutes                       │
│  ├─ Do: At least 5 more levels                          │
│  └─ Result: "Exploits require planning"                 │
│                                                         │
│  WEEK 5-6: CODEHAWKS PRACTICE                           │
│  ├─ What: Real audit contests, practice versions        │
│  ├─ Difficulty: 5-7                                     │
│  ├─ Time per contest: 4-6 hours                         │
│  ├─ Do: Participate in 2 contests                       │
│  └─ Result: "I found my first real bug"                 │
│                                                         │
│  WEEK 7-12: CODEHAWKS COMPETITIVE                       │
│  ├─ What: Real contests with prize money                │
│  ├─ Difficulty: 6-8                                     │
│  ├─ Time per contest: 4-8 hours                         │
│  ├─ Do: 4-6 contests total                              │
│  └─ Result: "I'm competitive now"                       │
│                                                         │
│  WEEK 13+: SHERLOCK OR IMMUNEFI                         │
│  ├─ What: Professional-grade auditing                   │
│  ├─ Difficulty: 8-9                                     │
│  ├─ Time per audit: Variable (1-2 weeks)                │
│  ├─ Do: Pick your first                                 │
│  └─ Result: "I'm a professional auditor"                │
│                                                         │
└─────────────────────────────────────────────────────────┘

How to Actually Win Contests

The Mistake: Rushing to find all bugs as fast as possible

The Strategy:

Hour 0-1:   READ and UNDERSTAND
            • What does this contract do?
            • What are the main functions?
            • Who can call what?

Hour 1-3:   ANALYZE for bugs
            • Check each function for vulnerabilities
            • Look at state changes
            • Check for access control issues

Hour 3-4:   VERIFY your findings
            • Can you actually exploit them?
            • Would the fix work?
            • Are you 100% sure?

Hour 4-5:   WRITE findings
            • Explain each bug clearly
            • Show the exploit path
            • Suggest fixes

Result: 4 bugs you're 100% sure of beats 10 bugs you're unsure about

Part 4: The Time Investment Reality (How Much Time, Actually)

The Honest Workload

People ask: “How many hours per week do I need?”

Honest answer: It depends on your goal.

┌──────────────────────────────────────────────────────┐
│       TIME COMMITMENT VS TIMELINE                    │
├──────────────────────────────────────────────────────┤
│                                                      │
│  5 hours/week     → Ready in 12 months               │
│  10 hours/week    → Ready in 6 months ⭐ OPTIMAL    │
│  15 hours/week    → Ready in 4 months                │
│  20+ hours/week   → Ready in 3 months (but risky)    │
│                                                      │
│  (Assumes you're learning efficiently)               │
│                                                      │
└──────────────────────────────────────────────────────┘

The 10 hours/week model is optimal because:

  • Enough to maintain momentum
  • Low enough to avoid burnout
  • Sustainable long-term
  • Brain actually retains information

Sample Weekly Schedule (10 hours/week)

Monday: 2 hours

• 30 min: Read 1 audit report (Sherlock database)
• 1 hour: Study 1 security pattern (flash loans? oracles?)
• 30 min: Update personal wiki with learnings

Wednesday: 2 hours

• 30 min: Read latest security blog/tweet
• 1.5 hours: Solve Ethernaut level or small contest

Friday: 2 hours

• 1.5 hours: Participate in practice contest
• 30 min: Review solutions you didn't see

Saturday: 4 hours

• 3.5 hours: Real contest or serious Ethernaut levels
• 30 min: Document findings in wiki

Total: 10 hours, spread out, sustainable forever


The Alternative: Weekends Only

If you work full-time and can’t do weekdays:

Saturday: 4 hours

• 1 hour: Reading (audit reports, security blogs)
• 3 hours: Contest or practice

Sunday: 2 hours

• 1.5 hours: Light practice or reading
• 30 min: Wiki documentation

Total: 6 hours/week (slower but doable)


Part 5: The 90-Day Transformation (Month-By-Month Breakdown)

MONTH 1: Building Foundations (Weeks 1-4)

Week 1-2: Learning Solidity

What you do:
• OpenZeppelin docs (fundamentals)
• Remix playground (experiments)
• CryptoZombies (fun learning)

What you build:
• Understanding of Solidity syntax
• Familiarity with contracts
• Comfort with Remix

Checkpoint:
✓ Can write a basic contract
✓ Understand msg.sender, require()
✓ Know what state vs memory means

Hours: 40-50

Week 3: Security Concepts

What you do:
• Read Trail of Bits articles
• Watch Ethernaut intro
• Study common vulnerabilities

What you learn:
• What reentrancy is (and why it's dangerous)
• Integer overflow/underflow
• Access control patterns

Checkpoint:
✓ Can identify obvious bugs
✓ Know the major vulnerability types
✓ Ready for first contest

Hours: 20-30

Week 4: First Contest

What you do:
• Start Ethernaut levels 1-5
• Fail and learn from solutions
• Document findings

What you learn:
• How to approach unfamiliar code
• What you don't know yet
• Audit thinking process

Checkpoint:
✓ Completed 5+ Ethernaut levels
✓ Have personal wiki started
✓ Found your first bug (even if simple)

Hours: 15-20

MONTH 1 RESULT: Foundation solid, ready to practice

MONTH 2: Intensive Practice (Weeks 5-8)

Week 5-6: Practice Contests

What you do:
• Do 1 CodeHawks practice contest
• Struggle, lose, learn anyway
• Read all official solutions

What you learn:
• Exploits are more complex than you thought
• Multiple interpretations possible
• You missed things

Checkpoint:
✓ Submitted findings (even if incomplete)
✓ Understand why you missed bugs
✓ See what professional reports look like

Hours: 12-16

Week 7-8: Contest Rhythm

What you do:
• Do 2 more practice contests
• Read 2 audit reports per week
• Document patterns in wiki

What you learn:
• Certain bugs appear repeatedly
• You start recognizing patterns
• Your speed improves

Checkpoint:
✓ Finding 60-70% of bugs
✓ Pattern recognition improving
✓ Understanding exploitability, not just bugs

Hours: 16-20

MONTH 2 RESULT: Practical skills developing, intuition building

MONTH 3: Specialization (Weeks 9-12)

Week 9-10: Choose Your Focus

What you do:
• Pick an area (DeFi? NFTs? Governance?)
• Read 3-4 audits from that area
• Participate in related contests

What you learn:
• Deep understanding of one domain
• Specific vulnerability patterns
• How protocols in that area work

Checkpoint:
✓ Can explain your specialty clearly
✓ Know common mistakes in that area
✓ Better than average in that category

Hours: 12-16

Week 11-12: Competitive Phase

What you do:
• Enter real contest (CodeHawks or Sherlock)
• Or continue practice with competitive mindset
• Write your first blog post

What you learn:
• You're actually ready
• Competition is fair
• Your knowledge is real

Checkpoint:
✓ Found real bugs in real contracts
✓ Competed against real auditors
✓ Share learnings publicly

Hours: 16-20

MONTH 3 RESULT: Intermediate auditor, ready to specialize further

Part 6: The Knowledge Retention Hack (Your Personal Wiki)

Why This Single Thing Changes Everything

The difference between auditors who keep getting better and auditors who plateau is documentation.

Specifically: A personal wiki where you document every vulnerability you’ve learned about.

What Goes In Your Wiki

For each vulnerability type:

Vulnerability Name: [e.g., Reentrancy]

Definition:
• One paragraph explaining what it is
• Why it's dangerous
• Real-world impact example

Code Pattern (Vulnerable):
• Show the problematic pattern
• Explain what's wrong

How It's Exploited:
• Step-by-step exploitation
• Why it works
• Who can do it

Prevention:
• The fix (pattern that works)
• Why this prevents it
• Alternative approaches

Real Examples:
• Link to audit that found this
• Link to exploit that used this
• Historical hacks using this

Related Vulnerabilities:
• What often goes with this bug
• Why they compound
• Combined impact

Why This Works

Reason 1: Spaced Repetition Writing something forces your brain to process it. Reading it again later reinforces it.

Reason 2: Future Reference In 6 months, you WILL forget what you learned. Your wiki doesn’t forget.

Reason 3: Teaching Others When someone asks you about reentrancy, you pull up your wiki. You look like an expert.

Reason 4: Pattern Recognition As your wiki grows, you START SEEING PATTERNS. Some bugs always appear together. Certain fix patterns work universally. Your brain makes these connections automatically.

The Platforms

Notion: Best for organization, searchable, easy to share sections Obsidian: Best for offline, local files, fast Dev.to: Best if you want public wiki (builds brand)

Pick one and start TODAY.


Part 7: The Failure Patterns (Traps 80% Fall Into)

Trap 1: Too Much Theory, No Practice

The Pattern:

Month 1: Read Mastering Ethereum (500 pages)
Month 2: Watch YouTube tutorials (40 hours)
Month 3: Finally do first contest
Month 4: Realize you understood nothing
Result: Quit, drained, no skills

The Fix: Theory : Practice should be 30:70, not 70:30

Learn enough to understand contests, then let contests teach you.


Trap 2: Expecting Success Immediately

The Pattern:

Week 1: Do first contest
Week 2: "I only found 1 bug out of 5"
Week 3: "Maybe I'm not cut out for this"
Week 4: Quit
Result: Never gave it a chance

The Reality: Finding 20% of bugs in month 1 is GOOD. Finding 50% in month 2 is NORMAL. Finding 80% in month 3 is EXPECTED.

The Fix: Measure progress in months, not weeks.


Trap 3: Not Documenting

The Pattern:

Week 1: Learn about reentrancy
Week 2: Never think about it again
Month 2: See reentrancy in contest
Month 2: "Wait, what was reentrancy again?"
Month 3: Waste hours relearning
Result: 3x slower progress

The Fix: Write it down when you learn it. Seriously.


Trap 4: Constantly Changing Focus

The Pattern:

Month 1: "I'll specialize in DeFi"
Month 2: "Actually NFTs are cooler"
Month 3: "Wait, governance security!"
Month 4: "Maybe I'll learn MEV"
Result: Mediocre at everything, expert at nothing

The Reality: Specialists make 3x more than generalists in auditing.

Specialization compounds. Stay focused 6 months minimum.

The Fix: Pick ONE area and commit to it for 6 months.


Trap 5: Only Reading Negative Findings

The Pattern:

Read 10 audit reports, only look at "Issues" section
Miss: Code quality insights
Miss: Security patterns that WORKED
Miss: Why developers designed it that way
Result: Only understand attacks, not design

The Reality: Learning what’s GOOD is as important as what’s bad.

The Fix: Read whole reports. Understand good patterns, not just bad ones.


Part 8: The Specialization Paths (Choose Your Channel)

After 3 months, you’ll be at a crossroads. You can be a generalist, or you can specialize.

Specialists earn 2-3x more.

Path 1: DeFi Security Specialist

Focus Areas:

  • Lending protocols (Aave, Compound, Curve)
  • Swaps and AMMs
  • Derivatives and leverage
  • Liquidation mechanics

Required Knowledge:

  • How DeFi protocols work
  • Financial mechanics
  • Economics modeling

Earning Potential: $150k-300k annually (at specialist level)

Demand: Very high (most protocols are DeFi)


Path 2: NFT & Contract Specialist

Focus Areas:

  • NFT standards (ERC721, ERC1155)
  • Marketplace mechanics
  • Royalty systems
  • Metadata security

Required Knowledge:

  • NFT standards deeply
  • Marketplace patterns
  • Collection dynamics

Earning Potential: $100k-200k annually

Demand: Medium (fewer NFT projects than DeFi)


Path 3: Governance & DAO Specialist

Focus Areas:

  • Voting mechanisms
  • Proposal systems
  • Treasury management
  • Token distribution

Required Knowledge:

  • Governance theory
  • Voting game theory
  • Treasury management

Earning Potential: $120k-200k annually

Demand: Growing (more DAOs launching)


Path 4: Cross-Chain & Bridge Specialist

Focus Areas:

  • Message validation
  • Bridge security
  • Cross-chain atomicity
  • Oracle integration

Required Knowledge:

  • Multiple chain mechanics
  • Message validation
  • Cross-chain state

Earning Potential: $200k-400k annually (niche, high demand)

Demand: Very high (specialized, few experts)


Part 9: Your 12-Month Trajectory (What To Expect)

┌──────────────────────────────────────────────────────┐
│          THE REALISTIC 12-MONTH ARC                 │
├──────────────────────────────────────────────────────┤
│                                                      │
│  MONTH 1-3: FOUNDATION                               │
│  └─ Learning, lots of failures, first bug finds      │
│     Skills: 30% | Confidence: 20% | Income: $0      │
│                                                      │
│  MONTH 4-6: PRACTICE RAMPS UP                        │
│  └─ Winning more contests, pattern recognition      │
│     Skills: 60% | Confidence: 50% | Income: $0-5k   │
│                                                      │
│  MONTH 7-9: SPECIALIZATION                           │
│  └─ Deep diving your chosen area, consistent wins    │
│     Skills: 75% | Confidence: 70% | Income: $5-15k  │
│                                                      │
│  MONTH 10-12: PROFESSIONAL                           │
│  └─ Actively auditing, building reputation           │
│     Skills: 85% | Confidence: 85% | Income: $15-50k │
│                                                      │
│  MONTH 13+: SCALING                                  │
│  └─ Choosing clients, rejecting easy work            │
│     Skills: 90%+ | Confidence: 95% | Income: $50k+  │
│                                                      │
└──────────────────────────────────────────────────────┘

The inflection point usually happens around month 6-7:

  • You stop looking for opportunities
  • Opportunities start looking for you
  • Your blog/Twitter attracts clients
  • You become selective about projects

Part 10: Your First 7 Days (Action Plan)

Stop reading, start doing.

Here’s exactly what to do:

TODAY:

□ Install Remix IDE (10 min)
□ Create Notion/Obsidian wiki (15 min)
□ Follow 10 security researchers on Twitter (10 min)
Total: 35 minutes

Tomorrow:

□ Complete Ethernaut Level 1 (20 min)
□ Document it in your wiki (15 min)
□ Read 1 OpenZeppelin docs page (15 min)
Total: 50 minutes

This Week:

□ Complete Ethernaut Levels 1-5 (2 hours)
□ Write 1 security concept in wiki (30 min)
□ Read 1 Trail of Bits article (30 min)
□ Make a commitment to weekly routine (10 min)
Total: ~3.5 hours

By End of Week:

✓ You've started learning
✓ You've won 5 times
✓ You have documented one learning
✓ You're part of security community
✓ You have zero excuses left

Part 11: The Final Truth

On the “30-Day Auditor” Lie

You’ll see courses claiming you can become an auditor in 30 days.

They’re selling you a dream.

Here’s why it’s impossible:

  1. Pattern Recognition Takes Time

    • Your brain needs exposure to many examples
    • 30 days isn’t enough repetitions
    • Expertise requires ~10,000 hours (generally)
  2. Intuition Requires Experience

    • You can’t teach intuition
    • It develops through repeated problem-solving
    • You need to fail multiple times
  3. The Market Knows

    • Protocols hiring auditors ask about experience
    • They want someone who’s audited 50+ contracts
    • Not someone who took a 30-day course

On the Realistic Timeline

3 months: Intermediate (contest ready) 6 months: Professional (can audit for pay) 12 months: Specialist (deep expertise) 2+ years: Expert (commanding high fees)

This isn’t a flaw. This is how expertise actually works.

Your Actual Advantage

If you commit to this path, here’s what you get:

✅ 95% of people quit at week 2
✅ You're already thinking long-term
✅ 10 hours/week is doable
✅ You have a roadmap
✅ You understand the psychology

You’re not competing against auditors with PhDs.

You’re competing against people without plans who quit.

That’s a competition you win automatically.


Your Last Checkpoint

Before you close this tab:

Ask yourself:

“Am I actually going to do this, or am I just reading for entertainment?”

If entertainment: Cool, glad you learned something. Move on.

If actually doing it: Go install Remix RIGHT NOW.

Not tomorrow. Not after you finish reading other guides.

Now.

Because the people who start today are the people who audite real contracts 3 months from now.

The people who plan to start tomorrow?

They never do.

Don’t be that person.

Your first Ethernaut level is waiting.

Go solve it.

Then come back and read this again tomorrow.

That’s the real framework: Read, do, repeat.

Not read, study, prepare, overthink, wait.

Read. Do. Repeat.

See you on Twitter when you find your first real bug. 🔍