Advanced
In reply to @cg
Greg Skriloff@greg
1/23/2023

I actually haven’t used multicall yet but should probs know how it works - will dive in later and get back to you

In reply to @greg
cam glynn@cg
1/23/2023

amazing - I’m just trying to reverse engineer the data payload it seems it starts with the identifier for the multicall function (ac9650d8) then 20 (/32 in hex - guessing this is referring to the fact that the type is byte32) then number of functions called in the multicall (2,3,4, etc.) after that I’m lost

In reply to @greg
cam glynn@cg
1/23/2023

ok I think I figured it out - dm’d you and will confirm tm and post my own documentation on FC if I’ve got it right