Security research

Security Research.

Public write-ups on the bugs, patterns, and protocols we audit. Engineer-to-engineer, no fluff.

Filter
Showing 12 of 110

All research.

Why Fuzz Testing Catches Bugs That Unit Tests Miss: Foundry Invariant Testing for DeFi
Smart Contract SecurityApr 17, 2024·11 min

Why Fuzz Testing Catches Bugs That Unit Tests Miss: Foundry Invariant Testing for DeFi

How fuzz testing catches smart contract bugs that unit tests miss: Foundry invariant testing, property-based fuzzing, and real DeFi exploit examples — Zealynx Security.

Read
Fuzzing + Formal Verification: Two Layers That Catch What Manual Audits Miss
Smart Contract SecurityFeb 21, 2024·16 min

Fuzzing + Formal Verification: Two Layers That Catch What Manual Audits Miss

Discover how fuzz testing and formal verification enhance blockchain security. Deep dive into advanced techniques for detecting critical smart contract vulnerabilities.

Read
Cut Your Audit Cost by 30%: The Pre-Audit Prep Checklist for Protocol Teams
Audit OperationsFeb 20, 2024·11 min

Cut Your Audit Cost by 30%: The Pre-Audit Prep Checklist for Protocol Teams

Learn how to prepare for a smart contract audit efficiently. Essential checklist for documentation, tests, and code quality to maximize audit productivity.

Read
Uniswap V2 Router Explained — addLiquidity Line by Line
DeFi Protocol AnalysisOct 16, 2023·10 min

Uniswap V2 Router Explained — addLiquidity Line by Line

Deep dive into Uniswap V2 Router's addLiquidity function line by line. Understand how liquidity is calculated, LP tokens are minted, and what risks liquidity providers face — from impermanent loss to smart contract vulnerabilities.

Read
Overflow & Underflow in Solidity: Real Audit Findings, Code Examples & Practice Exercise
Web3 Attack VectorsJun 13, 2023·19 min

Overflow & Underflow in Solidity: Real Audit Findings, Code Examples & Practice Exercise

Learn about overflow and underflow vulnerabilities in Solidity with real high and medium severity audit findings, code examples, and an exercise to practice.

Read
Liquity Protocol — Stability Pool, Liquidations & Redemptions (Part 2)
DeFi Protocol AnalysisMay 29, 2023·7 min

Liquity Protocol — Stability Pool, Liquidations & Redemptions (Part 2)

Deep dive into Liquity's Stability Pool, liquidation mechanics, and redemption logic — explained from the smart contracts. How LUSD absorbs debt, ETH gets redistributed, and Troves get redeemed.

Read
Auditing a Live Protocol: Lessons from the Juicebox Buyback Delegate Security Review
DeFi Protocol AnalysisMay 19, 2023·7 min

Auditing a Live Protocol: Lessons from the Juicebox Buyback Delegate Security Review

Learn how to prepare a security audit summary for an already deployed protocol. A practical walkthrough using the Juicebox Buyback Delegate audit.

Read
Liquity Protocol — DeFi Protocol Explained from Its Smart Contracts (Part 1)
DeFi Protocol AnalysisApr 28, 2023·12 min

Liquity Protocol — DeFi Protocol Explained from Its Smart Contracts (Part 1)

Deep dive into Liquity protocol's smart contracts: LUSD/LQTY tokens, Troves, borrowing mechanics, price feeds, and liquidation logic explained from the source code.

Read
Real-Life Denial of Service Attacks on Smart Contracts
Web3 Attack VectorsApr 26, 2023·10 min

Real-Life Denial of Service Attacks on Smart Contracts

Explore real-life examples of Denial of Service (DoS) attacks on smart contracts found in audit contests. Learn about DoS caused by underflow, gas limits, nonReentrant modifiers, external calls, and malicious receivers.

Read
Inline Assembly Gas Tricks: Hashing, Loops & Storage Writes That Save 30%+ in Solidity
Smart Contract SecurityApr 23, 2023·5 min

Inline Assembly Gas Tricks: Hashing, Loops & Storage Writes That Save 30%+ in Solidity

Learn how to use inline assembly (Yul) in Solidity to save gas on hashing, loops, math operations, storage writes, zero-address checks, and ETH balance reads — with side-by-side gas comparisons.

Read
Aave V3 Pool.sol Deep Dive: Supply, Borrow & Withdraw Logic Every Auditor Must Know
DeFi Protocol AnalysisApr 18, 2023·8 min

Aave V3 Pool.sol Deep Dive: Supply, Borrow & Withdraw Logic Every Auditor Must Know

Deep dive into Aave V3 Pool.sol — supply, withdraw, borrow, and repay functions explained. Understand the core smart contract architecture auditors need to know.

Read
Phishing Attack in Web3: Why You Should Never Use tx.origin
Web3 Attack VectorsMar 7, 2023·6 min

Phishing Attack in Web3: Why You Should Never Use tx.origin

Learn why using tx.origin for authorization in Solidity is vulnerable to phishing attacks, how attackers exploit it, and how msg.sender prevents it.

Read