Serum & Wormhole Hackathon @Asia Application Guide

Hi, HackerLink BUIDLers!

Welcome to Serum & Wormhole Hackathon @Asia, here is your first step to tackle the Grant by submitting your BUIDL application. Below is how to:

How to Apply

1. Open https://hackerlink.io, and click on the right corner to log in. (If you’re new to Hackerlink, login with your GitHub or Email. If you encounter a mobile verification process, you may skip.)

2. Go to “Serum & Wormhole Hackathon @Asia” and click “Apply Grant” and connect your wallet (the best way to do it is using Phantom extension on Chrome).

3. If you’re a new hacker to Hackerlink, please click “Create a new BUIDL to apply”.

4. Fill in the form to offer the information about your project. For URLs, please give only 1 URL in every blank.

5. Once you’ve filled out everything, click on “Submit”. Please do NOT skip the gas fee, otherwise, your project cannot be submitted successfully.

You will be able to see your submitted project on the page when the verification succeeds.

6. Filled out the wrong information? BUIDL needs to be updated? Is a new project demo available now? Through HackerLink, you can easily update the information about your BUIDL so that your content and progress can be seen.

7. You can edit any details of your project in “Account-My BUIDLs”.

About Serum

Serum is a protocol and ecosystem that brings unprecedented speed and low transaction costs to decentralized finance. It is built on Solana and is completely permissionless. Ecosystem partners can compose with Serum’s on-chain central limit orderbook to share liquidity and power markets-based features for institutional and retail users. View more here: https://docs.projectserum.com/introduction/overview

About DoraHacks

DoraHacks is a global hackathon organizer and one of the world’s most active developer communities. HackerLink (https://hackerlink.io/en) is DoraHacks’ open source developer platform and open source curation market. HackerLink provides unique on-chain tools to incentivize open source developments around the world. The platform is offering features including hacker profile, BUIDL, quadratic funding grants, bonding curve, bounties, hackathons to more than 100,000 users around the world.

Risk Notifications

Please note that the smart contracts generated from the Website will arrange and transfer the donated fund, conduct quadratic funding algorithm, and distribute contribution funds to the projects of which the voting results in favor. Please understand that the website cannot guarantee the authenticity, legality, and validity of the project information, though admins will contact the projects to verify the validity with their best effort. Please be aware of the risks of donation and voting and make rational decisions. Serum, HackerLink, or DoraHacks aren’t held responsible for any adverse consequences if any.

If you have any questions, please contact us on Telegram. We would like to hear more from you and let’s keep in touch!

For more Information

Please visit our Website| TelegramTwitterYoutube

--

--

--

A leading global hacker organization. https://dorahacks.io/

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Nokia: Enabling 5G and DevOps at a Telecom Company with Kubernetes

System Design — Google Sheets

What Replaces JavaScript

Software Testing: A Never-Ending Adventure — Ginbits

Pseudo and random Password creator with Powershell

No-Code: “It’s a Trap!” | Arctype

No-Code:

IOT AND BIG DATA TESTING: THE HIDDEN PITFALLS

Open Source at Indeed: Sponsoring the Open Source Initiative

Open Source Initiative logo

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
DoraHacks

DoraHacks

A leading global hacker organization. https://dorahacks.io/

More from Medium

DEX Recap for Rover’s RGFL:

Introduction to ARC Finance

Guide on How to Trade Perpetual Futures on Deri Protocol

DeFi Security Lecture 5-Overflow and Underflow Vulnerability