Transitioning from EVM to SVM: Key Concepts for Solana Security Assessments
Key concepts to understand the Solana Virtual Machine (SVM).
Key concepts to understand the Solana Virtual Machine (SVM).
This article explores how NEAR's unique account system combines human-readable names with multi-tiered permissions, examining the security implications and providing practical guidance for implementing robust access control in smart contracts.
This article analyzes the Pectra upgrade on Holesky that resulted in long non-finality and adverse network conditions. We explore ways the Lighthouse team recovered from non-finality and how current and future optimizations will make the...
Examining an interesting edge case discovered in EigenLayer's beacon chain slashing calculation that affects withdrawable share calculations.
A guide to understanding, configuring and debugging NAT configurations to maximize a Lighthouse client's performance.
Introduction In this article, we dive into the storage system of the NEAR blockchain. We'll explore how storage works on NEAR, how to use it securely, and highlight some of the common pitfalls. This is our second post about the NEAR blockchain....
NEAR Protocol introduces Nightshade sharding to tackle blockchain scalability while maintaining security. This article explores the security implications of cross-contract calls in sharded environments, demonstrating both proper implementation...
Many DeFi Protocols have decentralised using DAOs and token governance. This article explores the common vulnerabilities in the governance of DAOs with real-world examples.