Fusaka's Impact On Smart Contract Security
A summary of Ethereum's Fusaka upgrade and its implications on smart contract functionality.
A summary of Ethereum's Fusaka upgrade and its implications on smart contract functionality.
A comprehensive four-part series guide for security researchers who want to rise faster, build reputation, and make lasting impact in the web3 security space, from foundations to mastery and consistent results.
Practical security checklist and auditing guide for engineers reviewing SP1/RISC-V guest programs (also useful for Risc0). Covers input validation, 32-bit pitfalls, third-party dependency compatibility, overflow protection and verification key handling.
An explanation of how MEV affects cross-chain bridge exploits and the incentives driving them.
A summary of Ethereum's Pectra upgrade and its implications on smart contract functionality.
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
Key concepts to understand the Solana Virtual Machine (SVM).
Examining an interesting edge case discovered in EigenLayer's beacon chain slashing calculation that affects withdrawable share calculations.
Introduction In this article, we dive into the storage system of the NEAR blockchain. We'll explore how storage works on NEAR, how to use it securely, and highlight some of the common pitfalls. This is our second post about the NEAR blockchain....
Liquid Restaking protocols are a big trend in the DeFi space. This article explores the common vulnerabilities in liquid restaking protocols with real-world examples.