I actually haven’t used multicall yet but should probs know how it works - will dive in later and get back to you
amazing - I’m just trying to reverse engineer the data payload it seems it starts with the identifier for the multicall function (ac9650d8) then 20 (/32 in hex - guessing this is referring to the fact that the type is byte32) then number of functions called in the multicall (2,3,4, etc.) after that I’m lost
ok I think I figured it out - dm’d you and will confirm tm and post my own documentation on FC if I’ve got it right