
Contestants were presented with a series of vulnerable smart contracts and had to identify and fix the security issues before simulated hackers could exploit them. The challenge tested their knowledge of common vulnerabilities like reentrancy attacks, integer overflows, and access control problems.