Sitemap - 2024 - Verichains

AIZPT Token Hack Analysis

Verichains and The Blockchain Center Abu Dhabi Partner to Transform Blockchain Security in UAE & MENA Region

Polter Finance attack - BOO token price manipulation

Safely Forking the Aave Protocol

DeltaPrime exploit analysis

vETH incident with unknown mechanism

Case Study: Exploiting Access Control Flaw in Unverified Contract

Vista Finance Hack Analysis

Coin31 Token Incident Analysis

Ramses Exchange Hack Analysis

Morpho Protocol Market Oracle Price Exploit

Fire Token incident analysis

Bedrock DeFi incident analysis

Velocore's Incident Analysis

TradeOnOrion incident analysis

AAVE ParaSwap Repay Adapter Hack

Cut Incident - Price Manipulation

PenPie incident analysis

MO Token Hack Analysis

iVest Token Vulnerability: How an Attacker Manipulated Prices Using the Donation Feature

Novax incident - Price Manupilation

Convergence incident - How a simple vulnerability caused a $210K loss

Spectra Protocol Exploit: Arbitrary Call Strikes Again

LIFI Attack: Arbitrary Calls and Infinite Approval Risk

Dough Finance - Lack of Input Data Verification

MRP token exploit analysis

Analyzing the Flawed Logic in the JokInTheBox Attack

Deep Dive: $110,000 OSN Token Exploit

UwU hacked cause by price oracle manipulated

The Hidden Danger of Self-Transfers in ERC20 Contracts: A Lesson from the GPU Exploit

Unveiling the Scroll Token Attack: A Case Study in Solidity Overflow

Verichains at HITBxPHDays Bangkok: Demystifying the Critical “Proof Forgery Attack” on zkEVM

Predy Finance Attack - How a Liquidity Pool Can Be Drained

Compound V2 Forked Vulnerability - $20M Sonne Finance Hack

Outsmarting Reentrancy: How Transient Storage Saves Gas in Smart Contracts

When the bridge is the risk

Approval Error Vulnerability: Analyzing the HedgeyFinance Attack

Sumer Money hack - Reentrancy and exchange rate manipulation

Demystifying Flashbots: Protect Your Ethereum Transactions and Leverage MEV (Maximum Extractable Value)

Enhancing Security Code Review with Collaborative Teamwork

The risk of arbitrary calls

MO - Dual weaknesses in a single function

Discovering and Fixing a Critical Vulnerability in Polygon zkEVM

Demystifying TGBS Token Price Manipulation - Attack Analysis

Introducing Revela Decompiler: Enhancing security for on-chain Move bytecode

Weekly Highlight: The WOOFi Hack Explain

ERC404: a new standard or a new risk?

Is safeTransferFrom really safe?

Verichains and Ancient8 Join Forces to Enhance Security in GameFi

Miner Project Attacked by Vulnerabilities in ERC-X Token Standard

Lack of Validation in Input Data - The Case of AffineDeFi

A new approach to prevent supply chain attacks

Strengthening GameFi Security: Verichains and Sky Mavis Partnership

Unveiling the Shadows: Why Your Web 3 Project Needs a Pentesting

Verichains Recap 2023: Frontier Security Research

Zero input might cause unlimited lost

Gamma Protocol Exploit Analysis

Exploiting Radiant Lending Pool: A Deep Dive into Attack