Blog Logo
  • Home
  • Authors
  • Lighthouse
  • Security
  • About
  • Github
  • Twitter
  • Search
Menu
Category 13 Posts

Security

Category Security
Page 1 of 2 Older Posts

The Ultimate Guide to the Top for Security Researchers: Setting Sail

By Shealtielanz in Security on Wed 17 December 2025

A comprehensive four-part series guide for security researchers who want to rise faster, build reputation, and make lasting impact in the web3 security space, from foundations to mastery and consistent results.

securityguideinformative

SP1 and zkVMs: A Security Auditor's Guide

By Kirk Baird in Security on Wed 24 September 2025

Practical security checklist and auditing guide for engineers reviewing SP1/RISC-V guest programs (also useful for Risc0). Covers input validation, 32-bit pitfalls, third-party dependency compatibility, overflow protection and verification key handling.

securityzero-knowledgeguide

The Economics of MEV in Cross-Chain Bridge Exploits: A Game-Theoretic Analysis

By Gareth Larkan in Security on Tue 26 August 2025

An explanation of how MEV affects cross-chain bridge exploits and the incentives driving them.

securityinformative

Pectra's Impact On Smart Contract Security

By Toon Van Hove in Security on Thu 21 August 2025

A summary of Ethereum's Pectra upgrade and its implications on smart contract functionality.

securityinformative

A Security Engineer's Guide to Reviewing Core Blockchain Nodes

By Kirk Baird in Security on Fri 06 June 2025

A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example

securityrustnode

Transitioning from EVM to SVM: Key Concepts for Solana Security Assessments

By Dimaz Wijaya in Security on Tue 22 April 2025

Key concepts to understand the Solana Virtual Machine (SVM).

securitysolanaaccounts

Unraveling a Curious Edge Case in EigenLayer's Slashing Accounting

By EllipticPoint in Security on Tue 01 April 2025

Examining an interesting edge case discovered in EigenLayer's beacon chain slashing calculation that affects withdrawable share calculations.

securityinformative

NEAR Smart Contract Auditing: Storage

By Toon Van Hove in Security on Mon 10 February 2025

Introduction In this article, we dive into the storage system of the NEAR blockchain. We'll explore how storage works on NEAR, how to use it securely, and highlight some of the common pitfalls. This is our second post about the NEAR blockchain....

securityinformativenear

Common Vulnerabilities: Liquid Restaking Protocols - Smart Contracts

By Elmedin Burnik in Security on Tue 17 September 2024

Liquid Restaking protocols are a big trend in the DeFi space. This article explores the common vulnerabilities in liquid restaking protocols with real-world examples.

securitysoliditystaking

Forge Testing Leveling

By Dimaz Wijaya in Security on Mon 15 July 2024

Enhancing Forge testing with fuzzing and invariant testing for smart contract security.

securityinformativetesting
Page 1 of 2 Older Posts
Sigma Prime © 2023