Fusaka's Impact On Smart Contract Security
A summary of Ethereum's Fusaka upgrade and its implications on smart contract functionality.
A summary of Ethereum's Fusaka upgrade and its implications on smart contract functionality.
A comprehensive four-part series guide for security researchers who want to rise faster, build reputation, and make lasting impact in the web3 security space, from foundations to mastery and consistent results.
Practical security checklist and auditing guide for engineers reviewing SP1/RISC-V guest programs (also useful for Risc0). Covers input validation, 32-bit pitfalls, third-party dependency compatibility, overflow protection and verification key handling.
An explanation of how MEV affects cross-chain bridge exploits and the incentives driving them.
A summary of Ethereum's Pectra upgrade and its implications on smart contract functionality.
Analysis of a critical division-by-zero vulnerability in the EigenLayer sidecar rewards calculation process, its potential DoS impact, and the implemented fixes.
A comprehensive methodology for conducting security reviews of blockchain infrastructure, using Reth as a practical example
To achieve composability in DeFi, many projects require external sources of truth or price feeds. This article explores the common vulnerabilities in the use of pricing and oracles with real-world examples.
Key concepts to understand the Solana Virtual Machine (SVM).
This article explores how NEAR's unique account system combines human-readable names with multi-tiered permissions, examining the security implications and providing practical guidance for implementing robust access control in smart contracts.