Defensive Protocol Design
This article covers protective steps developers can take to prevent protocol exploits via defensive design.
This article covers protective steps developers can take to prevent protocol exploits via defensive design.
An introduction to ZK circuit security, exploring fundamental mental models for creating and thinking about ZK circuits. Learn about under-constrained variable vulnerabilities that appear in ZK code through a practical Circom example.
A summary of Ethereum's Fusaka upgrade and its implications on smart contract functionality.
A comprehensive four-part series guide for security researchers who want to rise faster, build reputation, and make lasting impact in the web3 security space, from foundations to mastery and consistent results.
Practical security checklist and auditing guide for engineers reviewing SP1/RISC-V guest programs (also useful for Risc0). Covers input validation, 32-bit pitfalls, third-party dependency compatibility, overflow protection and verification key handling.
An explanation of how MEV affects cross-chain bridge exploits and the incentives driving them.
A summary of Ethereum's Pectra upgrade and its implications on smart contract functionality.
Analysis of a critical division-by-zero vulnerability in the EigenLayer sidecar rewards calculation process, its potential DoS impact, and the implemented fixes.
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
To achieve composability in DeFi, many projects require external sources of truth or price feeds. This article explores the common vulnerabilities in the use of pricing and oracles with real-world examples.