Security research, vulnerability analysis, and insights from real-world engagements.
An analysis of cross-function and cross-contract reentrancy patterns found during recent DeFi protocol audits, including novel attack vectors in ERC-4626 vault implementations.
Case study of a full-scope red team engagement against a Web3 company, covering social engineering of developer teams, CI/CD pipeline compromise, and smart contract deployment key extraction.
A practical guide to validator key management security, comparing HSM-based approaches with MPC solutions and identifying common configuration mistakes that undermine both.
Practical techniques for writing effective fuzz harnesses for Solidity smart contracts, with benchmarks comparing Echidna and Medusa on real-world protocol code.
Deep dive into common vulnerability classes in cross-chain bridge implementations, from signature verification flaws to message replay attacks and oracle manipulation.
DEF CON · 2024
DEF CON · 2022
Infiltrate · 2023