Security research

Security Research.

Public write-ups on the bugs, patterns, and protocols we audit. Engineer-to-engineer, no fluff.

Filter
Showing 12 of 110

All research.

From EVM to SVM: A senior security researcher's guide to Solana in 2026
Smart Contract SecurityFeb 20, 2026·11 min

From EVM to SVM: A senior security researcher's guide to Solana in 2026

A technical guide for senior EVM security researchers transitioning to Solana's SVM. Covers Rust, Borsh, PDAs, Anchor, and the 2026 Solana security landscape.

Read
How to Start Your First Uniswap V4 Hook: Essentials, Libraries, and Risks
DeFi Protocol AnalysisFeb 19, 2026·13 min

How to Start Your First Uniswap V4 Hook: Essentials, Libraries, and Risks

Step-by-step guide to building your first Uniswap V4 hook. Learn the essential libraries, contract structure, hook permissions, and critical security considerations for DeFi developers.

Read
Uniswap V2 Code Deep Dive: Router, Factory, Pair & Security Risks
DeFi Protocol AnalysisFeb 18, 2026·11 min

Uniswap V2 Code Deep Dive: Router, Factory, Pair & Security Risks

Uniswap V2 code walkthrough: Router, Factory, and Pair contracts dissected. Understand the price oracle, flash swaps, and the reentrancy risks auditors flag — Zealynx.

Read
Beyond Static Checklists: A Defense‑in‑Depth Workflow for Smarter Smart Contract Audits
Audit OperationsFeb 17, 2026·8 min

Beyond Static Checklists: A Defense‑in‑Depth Workflow for Smarter Smart Contract Audits

Transform static security checklists into a defense-in-depth engineering workflow using threat modeling, Slither, and Foundry invariant testing.

Read
When Web2 Infrastructure Breaks DeFi: The Hidden Attack Surface
Adversarial & AI SecurityFeb 16, 2026·13 min

When Web2 Infrastructure Breaks DeFi: The Hidden Attack Surface

DeFi's biggest hacks didn't start in Solidity. DNS hijacking, UI injection, and cloud misconfigurations have drained billions. Learn how Web2 infrastructure failures become on-chain exploits and what your team can do to prevent them.

Read
Why AI Red Teaming Is No Longer Optional in Today's Security Landscape
Adversarial & AI SecurityFeb 15, 2026·9 min

Why AI Red Teaming Is No Longer Optional in Today's Security Landscape

AI systems are now business-critical infrastructure making decisions, triggering actions, and interacting with sensitive data at scale. Traditional security testing approaches are failing to address this expanded attack surface. Learn why AI red teaming has become essential.

Read
GameFi Security Checklist: 55+ Critical P2E Exploit Checks
Smart Contract SecurityFeb 14, 2026·20 min

GameFi Security Checklist: 55+ Critical P2E Exploit Checks

Complete GameFi and Play-to-Earn security checklist with 55+ actionable checks. Learn how to prevent exploits in NFT games, tokenomics, marketplace attacks, and game logic vulnerabilities. Essential guide for GameFi builders, auditors, and gaming protocols.

Read
Tokenizing Intellectual Property on EVM: Solidity Patterns for Programmable IP Rights
DeFi Protocol AnalysisFeb 13, 2026·9 min

Tokenizing Intellectual Property on EVM: Solidity Patterns for Programmable IP Rights

ERC-721 and ERC-2981 fail for real-world IP. Learn Solidity patterns for programmable royalty splits, copyright decay, and Ricardian contracts — via Zealynx.

Read
Proxy Security Checklist: 33 Critical Upgradeability Checks
Smart Contract SecurityFeb 12, 2026·22 min

Proxy Security Checklist: 33 Critical Upgradeability Checks

Complete proxy and upgradeability security checklist with 33+ actionable checks. Learn how to prevent exploits in UUPS, Transparent, Beacon, and Diamond proxy patterns. Storage safety, initialization, and upgrade mechanisms covered.

Read
MCP Security Guide: 24 Checks for AI Agents & MCP Servers
Adversarial & AI SecurityFeb 11, 2026·9 min

MCP Security Guide: 24 Checks for AI Agents & MCP Servers

Long-form MCP security guide covering 24 critical checks for AI agents and MCP servers. Learn breach patterns, tool poisoning risks, prompt injection defenses, and hardening priorities.

Read
Moving Averages in DeFi: Security Vulnerabilities and Attack Prevention
DeFi Protocol AnalysisFeb 10, 2026·14 min

Moving Averages in DeFi: Security Vulnerabilities and Attack Prevention

Moving averages power critical DeFi infrastructure from price oracles to AMMs, but create attack vectors for flash loan manipulation and precision exploits. Learn how to identify vulnerabilities in TWAP, SMA, and EMA implementations, plus proven mitigation strategies.

Read
Solana Audit Guide 2026: Firedancer & Token-2022 Risks
Smart Contract SecurityFeb 7, 2026·9 min

Solana Audit Guide 2026: Firedancer & Token-2022 Risks

2026 Solana security guide: Firedancer skip-vote vulnerabilities, Token-2022 transfer hook risks, localized DoS vectors, and a complete audit checklist.

Read