DeFi Protocol Analysis.

Line-by-line walkthroughs of Uniswap, Aave, Yearn, Liquity, and other protocols, written for engineers reading the source.

Filter
Showing 12 of 26
The ERC‑20 Pitfall: Why It Doesn't Fit Tokenized Securities and RWA Compliance
DeFi Protocol AnalysisDec 18, 2025·8 min

The ERC‑20 Pitfall: Why It Doesn't Fit Tokenized Securities and RWA Compliance

Discover why ERC-20's permissionless nature is a liability for Real World Assets (RWA) and how ERC-3643 enables institutional compliance on public blockchains.

Read
Building RWA Protocols on EVM: ERC-3643, ERC-7540 Vaults, and the SPV Synchronization Problem
DeFi Protocol AnalysisDec 12, 2025·8 min

Building RWA Protocols on EVM: ERC-3643, ERC-7540 Vaults, and the SPV Synchronization Problem

Master Real World Asset tokenization: implement ERC-3643 compliance, ERC-7540 async vaults, and secure SPV architecture. Technical guide for developers building RWA protocols.

Read
Uniswap V3 Explained: Concentrated Liquidity, Tick Math & Security Risks
DeFi Protocol AnalysisDec 4, 2025·15 min

Uniswap V3 Explained: Concentrated Liquidity, Tick Math & Security Risks

Uniswap V3 explained for developers. Learn concentrated liquidity, tick math, JIT liquidity, oracle manipulation, and the security checklist for safe integrations and forks.

Read
Uniswap V2 Security: Fork Safely & Avoid Costly Bugs
DeFi Protocol AnalysisNov 18, 2025·14 min

Uniswap V2 Security: Fork Safely & Avoid Costly Bugs

Don’t fork Uniswap V2 blind. ERC20 pool architecture, TWAP oracle manipulation risks, flash swap exploits, and 7 security pitfalls that cost forks millions.

Read
Uniswap V1: How the First AMM Worked (& Its Flaws)
DeFi Protocol AnalysisOct 27, 2025·11 min

Uniswap V1: How the First AMM Worked (& Its Flaws)

How Uniswap V1 invented the AMM: x*y=k invariant, ETH-only pools, and the price manipulation gaps that V2 had to fix. Security-first code analysis.

Read
Balancer Security Analysis: Critical Architecture Risks
DeFi Protocol AnalysisOct 17, 2025·14 min

Balancer Security Analysis: Critical Architecture Risks

Deep dive into Balancer V1–V3: vault architecture, weighted pools, flash loan risks, and the critical security vulnerabilities DeFi auditors look for — Zealynx Security.

Read
What Is Curve Finance? StableSwap, crvUSD, Risks, and Security
DeFi Protocol AnalysisOct 10, 2025·37 min

What Is Curve Finance? StableSwap, crvUSD, Risks, and Security

What Curve Finance is, how StableSwap, CryptoSwap, crvUSD, and LLAMMA work, where integrations fail, and which security risks DeFi teams should review before building on Curve.

Read
Top DEX Security Analysis: AMM Vulnerabilities Exposed
DeFi Protocol AnalysisOct 2, 2025·15 min

Top DEX Security Analysis: AMM Vulnerabilities Exposed

AMM security deep dive Part 2: how Uniswap V2–V4, Curve, and Balancer handle capital efficiency — and the slippage, sandwich, and oracle manipulation risks each introduces.

Read
AMM Security Foundations: Master DeFi Trading Risks
DeFi Protocol AnalysisSep 22, 2025·11 min

AMM Security Foundations: Master DeFi Trading Risks

Deep dive into the foundations of constant-product AMMs. Learn the math, smart contract building blocks, and core security risks behind decentralized trading protocols.

Read
Uniswap V2 Router Explained — addLiquidity Line by Line
DeFi Protocol AnalysisOct 16, 2023·10 min

Uniswap V2 Router Explained — addLiquidity Line by Line

Deep dive into Uniswap V2 Router's addLiquidity function line by line. Understand how liquidity is calculated, LP tokens are minted, and what risks liquidity providers face — from impermanent loss to smart contract vulnerabilities.

Read
Liquity Protocol — Stability Pool, Liquidations & Redemptions (Part 2)
DeFi Protocol AnalysisMay 29, 2023·7 min

Liquity Protocol — Stability Pool, Liquidations & Redemptions (Part 2)

Deep dive into Liquity's Stability Pool, liquidation mechanics, and redemption logic — explained from the smart contracts. How LUSD absorbs debt, ETH gets redistributed, and Troves get redeemed.

Read
Auditing a Live Protocol: Lessons from the Juicebox Buyback Delegate Security Review
DeFi Protocol AnalysisMay 19, 2023·7 min

Auditing a Live Protocol: Lessons from the Juicebox Buyback Delegate Security Review

Learn how to prepare a security audit summary for an already deployed protocol. A practical walkthrough using the Juicebox Buyback Delegate audit.

Read