A Security Engineer's Guide to Reviewing Core Blockchain Nodes
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
Announcing the release of Anchor 0.1.0, our Rust-based distributed validator technology client for the SSV network.
To achieve composability in DeFi, many projects require external sources of truth or price feeds. This article explores the common vulnerabilities in the use of pricing and oracles with real-world examples.
Instructional for Siren users that want to consolidate their validators.
Key concepts to understand the Solana Virtual Machine (SVM).
This article explores how NEAR's unique account system combines human-readable names with multi-tiered permissions, examining the security implications and providing practical guidance for implementing robust access control in smart contracts.
This article analyzes the Pectra upgrade on Holesky that resulted in long non-finality and adverse network conditions. We explore ways the Lighthouse team recovered from non-finality and how current and future optimizations will make the...
Examining an interesting edge case discovered in EigenLayer's beacon chain slashing calculation that affects withdrawable share calculations.