Sitemap - 2024 - Verichains
Polter Finance attack - BOO token price manipulation
Safely Forking the Aave Protocol
vETH incident with unknown mechanism
Case Study: Exploiting Access Control Flaw in Unverified Contract
Coin31 Token Incident Analysis
Morpho Protocol Market Oracle Price Exploit
Bedrock DeFi incident analysis
TradeOnOrion incident analysis
AAVE ParaSwap Repay Adapter Hack
Cut Incident - Price Manipulation
iVest Token Vulnerability: How an Attacker Manipulated Prices Using the Donation Feature
Novax incident - Price Manupilation
Convergence incident - How a simple vulnerability caused a $210K loss
Spectra Protocol Exploit: Arbitrary Call Strikes Again
LIFI Attack: Arbitrary Calls and Infinite Approval Risk
Dough Finance - Lack of Input Data Verification
Analyzing the Flawed Logic in the JokInTheBox Attack
Deep Dive: $110,000 OSN Token Exploit
UwU hacked cause by price oracle manipulated
The Hidden Danger of Self-Transfers in ERC20 Contracts: A Lesson from the GPU Exploit
Unveiling the Scroll Token Attack: A Case Study in Solidity Overflow
Verichains at HITBxPHDays Bangkok: Demystifying the Critical “Proof Forgery Attack” on zkEVM
Predy Finance Attack - How a Liquidity Pool Can Be Drained
Compound V2 Forked Vulnerability - $20M Sonne Finance Hack
Outsmarting Reentrancy: How Transient Storage Saves Gas in Smart Contracts
Approval Error Vulnerability: Analyzing the HedgeyFinance Attack
Sumer Money hack - Reentrancy and exchange rate manipulation
Enhancing Security Code Review with Collaborative Teamwork
MO - Dual weaknesses in a single function
Discovering and Fixing a Critical Vulnerability in Polygon zkEVM
Demystifying TGBS Token Price Manipulation - Attack Analysis
Introducing Revela Decompiler: Enhancing security for on-chain Move bytecode
Weekly Highlight: The WOOFi Hack Explain
ERC404: a new standard or a new risk?
Is safeTransferFrom really safe?
Verichains and Ancient8 Join Forces to Enhance Security in GameFi
Miner Project Attacked by Vulnerabilities in ERC-X Token Standard
Lack of Validation in Input Data - The Case of AffineDeFi
A new approach to prevent supply chain attacks
Strengthening GameFi Security: Verichains and Sky Mavis Partnership
Unveiling the Shadows: Why Your Web 3 Project Needs a Pentesting
Verichains Recap 2023: Frontier Security Research
Zero input might cause unlimited lost