Security research

Security Research.

Public write-ups on the bugs, patterns, and protocols we audit. Engineer-to-engineer, no fluff.

Filter
Showing 12 of 110

All research.

AI trading bot security: 5 critical attack vectors in DeFi
Adversarial & AI SecurityMar 30, 2026·21 min

AI trading bot security: 5 critical attack vectors in DeFi

Five systemic vectors targeting AI trading bots — adversarial ML, data poisoning, prompt injection, API exploits, supply chain compromise — with strategic mitigation.

Read
When AI controls DeFi vaults, prompt injection becomes remote code execution
Adversarial & AI SecurityMar 25, 2026·16 min

When AI controls DeFi vaults, prompt injection becomes remote code execution

How prompt injection drains AI-controlled DeFi vaults. Freysa and AiXBT exploits analyzed, EVMbench data, and defense architecture for autonomous agents.

Read
DAO governance attacks: how flash loans and vote manipulation drain treasuries
Web3 Attack VectorsMar 23, 2026·21 min

DAO governance attacks: how flash loans and vote manipulation drain treasuries

How attackers exploit DAO governance with flash loans, EVM opcode injection, and quorum exhaustion — plus audit strategies and defense architectures.

Read
EthCC 2026 Cannes: Security Guide for Web3 Builders
Industry and ComplianceMar 19, 2026·9 min

EthCC 2026 Cannes: Security Guide for Web3 Builders

Your complete guide to EthCC 2026 in Cannes. Key dates, side events, networking tips, and how Web3 builders can make the most of the conference.

Read
Oracle manipulation in DeFi: how price feeds become attack vectors
Web3 Attack VectorsMar 18, 2026·11 min

Oracle manipulation in DeFi: how price feeds become attack vectors

How attackers exploit oracle price feeds in DeFi using flash loans, AMM imbalances, and governance subversion — with defense patterns for protocol architects.

Read
How to protect your DeFi protocol from MEV: A full-stack defense guide
Web3 Attack VectorsMar 16, 2026·12 min

How to protect your DeFi protocol from MEV: A full-stack defense guide

Learn how to defend your DeFi protocol from sandwich attacks and MEV extraction with PBS, encrypted mempools, intent architectures, and Uniswap v4 hooks.

Read
ERC-4337 Smart Accounts: Six Failure Modes We're Already Seeing in Audits
Smart Contract SecurityMar 12, 2026·14 min

ERC-4337 Smart Accounts: Six Failure Modes We're Already Seeing in Audits

ERC-4337 account abstraction introduces programmable trust boundaries that break assumptions baked into decades of wallet security thinking. Here's where teams get it wrong.

Read
EthCC[9] in Cannes: Which Security Tracks Actually Matter for Protocol Teams
Industry and ComplianceMar 11, 2026·14 min

EthCC[9] in Cannes: Which Security Tracks Actually Matter for Protocol Teams

A developer-focused guide to EthCC[9] in Cannes — which security tracks, ZK sessions, and side events matter most for protocol teams shipping on EVM and Solana.

Read
The Weakest Link in DeFi Isn't the Smart Contract — It's the Web App
Adversarial & AI SecurityFeb 28, 2026·15 min

The Weakest Link in DeFi Isn't the Smart Contract — It's the Web App

DNS hijacks, supply chain attacks, and UI social engineering bypass smart contract security entirely. Learn how attackers exploit web apps to drain DeFi protocols and how to stop them.

Read
Smart Contract Audit Readiness for MiCA: What Your Codebase Needs Before You Apply
Industry and ComplianceFeb 27, 2026·10 min

Smart Contract Audit Readiness for MiCA: What Your Codebase Needs Before You Apply

MiCA enforcement is live and NCAs are issuing licenses now. If your codebase isn't audit-ready, your CASP application isn't ready either. Here's exactly what you need to fix before you request a quote.

Read
ERC-3643 vs ERC-1400 for RWA Compliance
DeFi Protocol AnalysisFeb 22, 2026·9 min

ERC-3643 vs ERC-1400 for RWA Compliance

Compare ERC-3643 and ERC-1400 for RWA compliance. See identity checks, partition tradeoffs, ACT risk, forced transfers, and when each token standard fits.

Read
MiCA Forces DeFi to Choose: Comply in 6 Months or Exit the EU Market
Industry and ComplianceFeb 21, 2026·12 min

MiCA Forces DeFi to Choose: Comply in 6 Months or Exit the EU Market

A practical compliance roadmap for DeFi protocols navigating Europe's new regulatory landscape. Learn how MiCA affects decentralized protocols and implement a 6-month compliance strategy.

Read