Open in app
Home
Notifications
Lists
Stories

Write
Dor Geyer
Dor Geyer

Home

Published in Certora

·Nov 21, 2021

Securing Protocols During Development- From a High Level Invariant to a Pool-Draining Vulnerability in SushiSwap’s Trident

Trident is SushiSwap’s upcoming platform for launching and running liquidity pools and managing their interactions with users; it is expected to handle billions worth of assets. This document describes a pool-draining exploit that was uncovered during its development, and the subsequent fix by SushiSwap. Most importantly, we describe how we…

Defi

7 min read

Securing Protocols During Development- From a High Level Invariant to a Pool-Draining Vulnerability
Securing Protocols During Development- From a High Level Invariant to a Pool-Draining Vulnerability
Dor Geyer

Dor Geyer

Software engineer, security researcher at Certora. dor@certora.com

Following
  • Mohammed Machraoui

    Mohammed Machraoui

  • Nabila Jaman Tisha

    Nabila Jaman Tisha

  • Ashley Gelwix

    Ashley Gelwix

  • Entrepreneuria

    Entrepreneuria

  • Answers Handbook

    Answers Handbook

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Knowable