473,382 Members | 1,332 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,382 software developers and data experts.

Term paper "Personal sign vulnerability"

Hello everyone.

I am cybersecurity student and i'm writing a term paper on the topic "Personal sign vulnerability".
I have found a few examples on github, but they don't work properly.

Every time i'm signing the message on testnet(Eth Goerly, Polygon Mumbai) i receive next error: insufficient funds for gas * price + value. I have enough funds on account to send them and pay for gas.
Also i've tried to work with hardhat local node and i got another error: sender doesn't have enough funds to send tx. The max upfront cost is: 10075158544175000 and the sender's account only has: 0
Of course, i have enough ether and correct account connected to web app

I don't understand why this error popping up and how to fix it.

My code uploaded to github - https://github.com/cybermage97/personal-sign-vulnerability

Help me please, I can't do it on my own
Nov 19 '22 #1
0 3543

Sign in to post your reply or Sign up for a free account.

Similar topics

10
by: Sona | last post by:
Hi, Could someone please explain what sign-extension means? If I have a hex number 0x55, how does this get sign-extended? Can a sign-extended counterpart be equal to -91? In a program I'm...
7
by: TooNaive | last post by:
Hello all, I'm taking a C class and am having to write a program to play a game of rock, paper scissors, and with the output of: You chose paper and I chose rock. You Win where paper is the...
4
by: Peter Tragardh | last post by:
I'm searching for info on how to authenticate a user in the same way that for example Source Safe does. I would like my system to use Windows as the authenticator, so that the user doesn't have to...
1
by: Vince | last post by:
Through VB6 I asm trying to print to the bottom bin with a paper type of LetterHead on an HP4200tn printer. After much messing around with my bin issue, I finally determined that if I keep the...
8
by: Frank Rizzo | last post by:
I am trying to print huge images (much bigger than target paper). I try and use e.PageSettings.HardMarginX and e.PageSettings.HardMarginY in the PrintDocument's PrintPage event to try and...
5
by: Alain R. | last post by:
Hi, i'm looking for a tutorial about how to implement a user authentication using the single sign on available in our company. could someone help me please ? i tried to google it but without...
2
by: Izkimar | last post by:
I'm supposed to redesign this paper scissors rock game that first happened between 2 players, and for only one round. Yet, now I'm supposed to take for loops and ask them if they want to play...
10
by: as1000 | last post by:
Hi, the prompt doesn't work. Any suggestions? If you could spell it out for me it would be helpful. I have only been doing this for less than a week Thanks! <!DOCTYPE html> <html> <head> ...
0
by: CyberMage | last post by:
Hello everyone. I am cybersecurity student and i'm writing a term paper on the topic "Personal sign vulnerability". I have found a few examples on github, but they don't work properly. Every...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 3 Apr 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome former...
0
by: ryjfgjl | last post by:
In our work, we often need to import Excel data into databases (such as MySQL, SQL Server, Oracle) for data analysis and processing. Usually, we use database tools like Navicat or the Excel import...
0
by: Charles Arthur | last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.