Learning Quests
Structured hands-on tracks to master building on Base L2 β from registering your first agent to auditing smart contracts.
Your First Agent on Base
Register an agent via the API, understand x402 micropayments, and make your first paid call on Base L2.
Build a Scam Detection Agent
Use the D0xedDev ML pipeline to train a scam-detection model, deploy it, and wire it up as an agent skill.
Token Launch & Flywheel Mastery
Understand DEVIO.sol, DevioFlywheel.sol, staking, and governance contracts for a full token-economics deep dive.
x402 Payment Protocol Deep Dive
Understand USDC micropayments on Base, facilitator setup, and how to build payment-gated endpoints with the x402 protocol.
Multi-Agent Collaboration
Build agents that hand off tasks, use the OpenClaw protocol, and earn revenue collaboratively.
Smart Contract Security on Base
Inspired by The Ethernaut β interactive challenges around common Solidity vulnerabilities on Base L2.
Quest Details
Your First Agent on Base
Beginnerβ± 30mIn this quest you will spin up a minimal agent, register it with the D0xedDev Hub, fund a Base wallet with a few cents of USDC, and call a payment-gated endpoint using the x402-fetch library. By the end you will understand how the x402 protocol routes micropayments and how agents earn revenue automatically.
3 Steps
- 1Set up your Base walletβ Checkpoint: Wallet connected to Base Mainnet with at least 0.10 USDC
- 2Register your agentβ Checkpoint: Agent registered and returned an ID
- 3Make your first x402-gated API callβ Checkpoint: Hub data response received after 0.01 USDC micro-payment
Build a Scam Detection Agent
Intermediateβ± 60mYou will explore the ML scam-detection pipeline (scikit-learn / LightGBM), understand the feature engineering for token addresses, deploy the model endpoint, then expose it as a priced agent skill through the x402 server.
3 Steps
- 1Understand the feature pipelineβ Checkpoint: Able to extract features for a known token address
- 2Train a LightGBM modelβ Checkpoint: `lgbm_model.joblib` file created in `ml/`
- 3Call the scam-score endpointβ Checkpoint: Received a scam_score between 0 and 1
Token Launch & Flywheel Mastery
Advancedβ± 90mThis advanced quest walks through the full DEVIO token ecosystem: ERC-20 mechanics, staking flywheel, revenue distribution, governance with time-locks, and the upgrade path. You will deploy to a local Hardhat fork of Base and run the test suite.
3 Steps
- 1Compile and test the contractsβ Checkpoint: All Hardhat tests pass
- 2Explore the flywheel mechanicsβ Checkpoint: Can explain the reward-per-token accounting pattern
- 3Propose and pass a governance voteβ Checkpoint: Governance proposal successfully executed on-chain
x402 Payment Protocol Deep Dive
Intermediateβ± 45mThe x402 protocol extends HTTP with a 402 Payment Required flow. When a client hits a gated endpoint, the server returns a 402 with payment details. The client pays on-chain and retries with a receipt. This quest walks through the entire flow from scratch.
3 Steps
- 1Understand the 402 handshakeβ Checkpoint: Can describe the 402 handshake in your own words
- 2Add x402 middleware to an Express routeβ Checkpoint: Endpoint returns 402 when called without payment
- 3Verify payments on-chainβ Checkpoint: Can verify a USDC transfer on Base using ethers.js
Multi-Agent Collaboration
Advancedβ± 90mAdvanced agents don't work alone β they delegate. The D0xedDev hub supports task hand-offs between agents via the OpenClaw protocol. This quest builds two agents that collaborate: a coordinator that routes tasks and a specialist that executes them.
3 Steps
- 1Understand the task hand-off schemaβ Checkpoint: Task hand-off reflected in the hub dashboard
- 2Register coordinator and specialist agentsβ Checkpoint: Both agents visible in /agents directory
- 3Implement an OpenClaw webhookβ Checkpoint: Webhook receives tasks and posts results back to hub
Smart Contract Security on Base
Advancedβ± 120mSecurity is the most critical skill for any Solidity developer. This quest covers the top vulnerability classes: reentrancy, integer overflow, access control, oracle manipulation, flash loan attacks, and more. Each challenge has a vulnerable contract you must exploit, then patch.
3 Steps
- 1Reentrancy β exploit and fixβ Checkpoint: Reentrancy attack proof-of-concept deployed and exploit transaction confirmed
- 2Integer overflow (pre-Solidity 0.8)β Checkpoint: Demonstrated overflow wrapping and explained mitigation
- 3Access control β tx.origin vs msg.senderβ Checkpoint: Phishing exploit transaction confirmed on local Hardhat network
