Security research

Security Research.

Public write-ups on the bugs, patterns, and protocols we audit. Engineer-to-engineer, no fluff.

Filter
Showing 12 of 110

All research.

Gamified Learning in Web3: Why Ranks, Leaderboards, and Lynx Actually Work
Smart Contract SecurityMay 18, 2026·11 min

Gamified Learning in Web3: Why Ranks, Leaderboards, and Lynx Actually Work

Gamification in learning often feels hollow. Here's why Zealynx Academy's rank and leaderboard system is different — and why it produces verifiable reputation, not points for points' sake.

Read
Anthropic MCP SDK Vulnerability (April 2026): Full Analysis
Adversarial & AI SecurityMay 15, 2026·12 min

Anthropic MCP SDK Vulnerability (April 2026): Full Analysis

Inside the April 2026 Anthropic MCP SDK design flaw: STDIO transport allows config-to-command-execution across Python, TypeScript, Java, Rust SDKs — by design.

Read
Inside the ETHSecurity Badge: Recognition from TheDAO Fund and What It Means
Zealynx NewsMay 14, 2026·10 min

Inside the ETHSecurity Badge: Recognition from TheDAO Fund and What It Means

TheDAO Security Fund awarded the ETHSecurity Badge to Ethereum security contributors. Holders get 4x matching impact in the Ethereum Security QF round, open through May 14, 2026.

Read
Pre-audit readiness engine: how Krait catches 12 findings that cost teams 30% more
Zealynx NewsMay 12, 2026·16 min

Pre-audit readiness engine: how Krait catches 12 findings that cost teams 30% more

Krait is the Zealynx pre-audit readiness engine. Catch the 12 finding categories that inflate smart contract audit quotes by 30% — locally, free, before booking.

Read
OWASP ASI04 Explained: Agentic Supply Chain Attacks
Adversarial & AI SecurityMay 12, 2026·12 min

OWASP ASI04 Explained: Agentic Supply Chain Attacks

OWASP ASI04 (Agentic Supply Chain Vulnerabilities) explained: MCP Impersonation, malicious tools, trojanised connectors. Real CVEs, attack patterns, mitigations.

Read
The Web3 Founder's Survival Guide: Everything No Engineering Curriculum Teaches
Industry and ComplianceMay 11, 2026·16 min

The Web3 Founder's Survival Guide: Everything No Engineering Curriculum Teaches

Most Web3 founders are technical and ship great code, then watch the protocol die to non-code problems. Tokenomics, fundraising, governance, regulatory, GTM — this is what kills teams.

Read
MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index
Adversarial & AI SecurityMay 8, 2026·13 min

MCP Vulnerabilities 2025-2026: 16+ CVEs & Breach Index

Complete MCP vulnerability index: 16 disclosed breaches and 14+ CVEs since April 2025 across Anthropic, Cursor, Postmark — with OWASP ASI04 patterns. Updated weekly.

Read
How to Build Your Own AI Auditor Agent (Interactive Guide, Multiple Paths)
Adversarial & AI SecurityMay 7, 2026·14 min

How to Build Your Own AI Auditor Agent (Interactive Guide, Multiple Paths)

Build an AI auditor agent that actually works. Multiple paths modeled after the best existing tools, benchmarked against 118 real Code4rena findings.

Read
Supply Chain Attacks in Web3 — From NPM to Protocol Exploits
Adversarial & AI SecurityMay 6, 2026·12 min

Supply Chain Attacks in Web3 — From NPM to Protocol Exploits

Complete guide to Web3 supply chain attacks with 5 vectors, real incidents, and actionable checklist.

Read
OWASP Smart Contract Top 10 2026: changes and audit guide
Industry and ComplianceMay 4, 2026·29 min

OWASP Smart Contract Top 10 2026: changes and audit guide

The 2026 OWASP Smart Contract Top 10 elevated business logic to #2 and added proxy & upgradeability at #10. Here's what changed and how to audit.

Read
Flash loan attacks: anatomy of nine-figure DeFi exploits
Web3 Attack VectorsApr 29, 2026·37 min

Flash loan attacks: anatomy of nine-figure DeFi exploits

How flash loans amplify oracle, donation, and reentrancy bugs into $200M+ DeFi exploits — Cetus, Penpie, KyberSwap, UwU Lend case studies plus defenses that hold.

Read
Shadow Audits: How to Learn Web3 Security by Breaking Real Protocol Forks
Zealynx NewsApr 29, 2026·15 min

Shadow Audits: How to Learn Web3 Security by Breaking Real Protocol Forks

Shadow audits replay past public security contests on real protocol forks. Learn Web3 security the way top auditors did: reviewing graded contests, fast.

Read