Security research

Security Research.

Public write-ups on the bugs, patterns, and protocols we audit. Engineer-to-engineer, no fluff.

Filter
Showing 12 of 110

All research.

The ERC‑20 Pitfall: Why It Doesn't Fit Tokenized Securities and RWA Compliance
DeFi Protocol AnalysisDec 18, 2025·8 min

The ERC‑20 Pitfall: Why It Doesn't Fit Tokenized Securities and RWA Compliance

Discover why ERC-20's permissionless nature is a liability for Real World Assets (RWA) and how ERC-3643 enables institutional compliance on public blockchains.

Read
The Pre-Audit Checklist: How to Save 30% on Your Smart Contract Audit
Audit OperationsDec 16, 2025·7 min

The Pre-Audit Checklist: How to Save 30% on Your Smart Contract Audit

Cut smart contract audit costs by 30% with proper preparation. Complete pre-audit checklist for DeFi protocols: testing, documentation, and security tools.

Read
Building RWA Protocols on EVM: ERC-3643, ERC-7540 Vaults, and the SPV Synchronization Problem
DeFi Protocol AnalysisDec 12, 2025·8 min

Building RWA Protocols on EVM: ERC-3643, ERC-7540 Vaults, and the SPV Synchronization Problem

Master Real World Asset tokenization: implement ERC-3643 compliance, ERC-7540 async vaults, and secure SPV architecture. Technical guide for developers building RWA protocols.

Read
Divide and Conquer Auditing: Breaking Down Uniswap V2 to Find Critical DeFi Bugs
Audit OperationsDec 9, 2025·13 min

Divide and Conquer Auditing: Breaking Down Uniswap V2 to Find Critical DeFi Bugs

Learn how elite auditors break down complex DeFi protocols to find critical vulnerabilities. Step-by-step guide using Uniswap V2 as a real-world case study.

Read
Uniswap V3 Explained: Concentrated Liquidity, Tick Math & Security Risks
DeFi Protocol AnalysisDec 4, 2025·15 min

Uniswap V3 Explained: Concentrated Liquidity, Tick Math & Security Risks

Uniswap V3 explained for developers. Learn concentrated liquidity, tick math, JIT liquidity, oracle manipulation, and the security checklist for safe integrations and forks.

Read
Linear Algebra & Calculus Attack Vectors in Large Language Models
Adversarial & AI SecurityNov 29, 2025·16 min

Linear Algebra & Calculus Attack Vectors in Large Language Models

Discover how linear algebra, calculus, probability theory, and statistics create security vulnerabilities in AI systems. Learn the mathematical foundations hackers exploit to jailbreak LLMs and compromise AI models.

Read
Uniswap V2 Security: Fork Safely & Avoid Costly Bugs
DeFi Protocol AnalysisNov 18, 2025·14 min

Uniswap V2 Security: Fork Safely & Avoid Costly Bugs

Don’t fork Uniswap V2 blind. ERC20 pool architecture, TWAP oracle manipulation risks, flash swap exploits, and 7 security pitfalls that cost forks millions.

Read
What Is Hyperliquid Exchange? 2026 Builder Guide to API, SDKs & HyperEVM
Industry and ComplianceNov 10, 2025·11 min

What Is Hyperliquid Exchange? 2026 Builder Guide to API, SDKs & HyperEVM

What is Hyperliquid exchange, how does HyperEVM fit in, and what can developers build on top? Learn the Hyperliquid API, Python and TypeScript SDKs, builder codes, and real project ideas.

Read
Cognitive Psychology Reveals LLM Vulnerabilities: AI Security Foundations
Adversarial & AI SecurityNov 4, 2025·19 min

Cognitive Psychology Reveals LLM Vulnerabilities: AI Security Foundations

Explore the cognitive foundations of AI security in part 1 of our LLM Security Deep Dive. Learn how cognitive psychology uncovers vulnerabilities in large language models and modern AI systems, empowering you to understand and secure advanced neural networks.

Read
Uniswap V1: How the First AMM Worked (& Its Flaws)
DeFi Protocol AnalysisOct 27, 2025·11 min

Uniswap V1: How the First AMM Worked (& Its Flaws)

How Uniswap V1 invented the AMM: x*y=k invariant, ETH-only pools, and the price manipulation gaps that V2 had to fix. Security-first code analysis.

Read
Balancer Security Analysis: Critical Architecture Risks
DeFi Protocol AnalysisOct 17, 2025·14 min

Balancer Security Analysis: Critical Architecture Risks

Deep dive into Balancer V1–V3: vault architecture, weighted pools, flash loan risks, and the critical security vulnerabilities DeFi auditors look for — Zealynx Security.

Read
What Is Curve Finance? StableSwap, crvUSD, Risks, and Security
DeFi Protocol AnalysisOct 10, 2025·37 min

What Is Curve Finance? StableSwap, crvUSD, Risks, and Security

What Curve Finance is, how StableSwap, CryptoSwap, crvUSD, and LLAMMA work, where integrations fail, and which security risks DeFi teams should review before building on Curve.

Read