Blog Logo
  • Home
  • Authors
  • Lighthouse
  • Security
  • About
  • Github
  • Twitter
  • Search
Menu
Category 8 Posts

Security

Category Security
Page 1 of 1

Transitioning from EVM to SVM: Key Concepts for Solana Security Assessments

By Dimaz Wijaya in Security on Tue 22 April 2025

Key concepts to understand the Solana Virtual Machine (SVM).

securitysolanaaccounts

Unraveling a Curious Edge Case in EigenLayer's Slashing Accounting

By EllipticPoint in Security on Tue 01 April 2025

Examining an interesting edge case discovered in EigenLayer's beacon chain slashing calculation that affects withdrawable share calculations.

securityinformative

NEAR Smart Contract Auditing: Storage

By Toon Van Hove in Security on Mon 10 February 2025

Introduction In this article, we dive into the storage system of the NEAR blockchain. We'll explore how storage works on NEAR, how to use it securely, and highlight some of the common pitfalls. This is our second post about the NEAR blockchain....

securityinformativenear

Common Vulnerabilities: Liquid Restaking Protocols - Smart Contracts

By Elmedin Burnik in Security on Tue 17 September 2024

Liquid Restaking protocols are a big trend in the DeFi space. This article explores the common vulnerabilities in liquid restaking protocols with real-world examples.

securitysoliditystaking

Forge Testing Leveling

By Dimaz Wijaya in Security on Mon 15 July 2024

Enhancing Forge testing with fuzzing and invariant testing for smart contract security.

securityinformativetesting

The Effects of Ethereum's Upgrades on Smart Contracts

By Toon Van Hove in Security on Thu 20 June 2024

A summary of Ethereum's upgrades and their implications on smart contract functionality.

securityinformative

On the Importance of the Security Alliance

By Richard Skinner Mehdi Zerouali in Security on Wed 10 April 2024

About the new Security Alliance and why we support it

securityinformativeannouncement

Using Proxies: An Essential Guide

By Richard Skinner in Security on Tue 26 September 2023

A practical guide to safe choices and best practices when deploying proxies for a project

securityinformative
Page 1 of 1
Sigma Prime © 2023