Sitemap - 2025 - Verichains

Defending Against NPM Supply Chain Attacks - NPM Vulnerability Scanner

EIP-7702: A Double-Edged Sword for Ethereum Security

Inside the Impermax V3 Hack

Numa Incident Analysis

#RANT Exploit Analysis

The WETC Double-Spend

Audit the Deployment, Not Just the Code

SuperRare Exploit Analysis

Anatomy of a Hack: How a Simple Logic Flaw Led to a $285k Exploit on Zoth

GMX $42M Exploit: Root Cause Analysis and Technical Breakdown

Burned by Design: The Fatal Flaw Behind Future Protocol’s $4.6M Exploit

Silo Finance Incident: A Costly Test

"Free" Minting from Meta Pool Ethereum Staking Contract

YB token hack analysis

Cork Protocol Exploit Analysis

MBU Exploit on BNB Chain: $2.15M Loss Analysis

Multiple Sui Projects Previously Exposed to Critical Math Bug Found in Cetus Hack

Cetus Protocol $260M Exploit: Root Cause Analysis and Technical Breakdown

LIFE Protocol Hack Analysis

Step Hero's Reentrancy in Referral System

DCF token hack analysis

BTNFT Incident - Improper Validation Check Leads to Unauthorized Reward Claim

Ripple’s xrpl.js npm Package Compromised in Supply Chain Attack

WebKeyDao Hack Analysis

Alkimiya Hack Analysis

Unsafe Transfers Leading to an Attack

EIP-1153 - Transient Storage: Save Gas, Lose Bag

Phân tích: Lạm dụng API riêng tư trên iOS ở một số app ngân hàng Việt

Technical Analysis - Improper Use of Private iOS APIs in some Vietnamese Banking Apps

Hegic Options Protocol: How a Deprecated Contract Led to an $80K Exploit

Unveiling the Flawed Logic in the Mosca Project

Into Curve Invariant - part 2

Technical Analysis of the Bybit Hot Wallet Exploit

Four.meme Hack Analysis

ERC-6492 Deployment Vulnerability: Leveraging isValidSignature Bypass via Pre-compiled contract

zkLend Finance Incident Analysis

MoonHacker Vault Hack Analysis

Mosca Hack Analysis

Into Curve Invariant - part 1