PolgemyinDecurityTypical vulnerabilities in AMM protocolsThis article discusses the fundamental security aspects of the AMM (automatic market maker) protocols.21 min read·Aug 7, 2023--1--1
PolgemyinDecurityTypical vulnerabilities in LSD protocolsIn this article, we will examine the security aspects of widely used Liquid Staking Derivatives (LSD) protocols.14 min read·Jun 6, 2023----
PolgemyinDecurityTypical vulnerabilities in lending and CDP protocolsThis article explains the security of a popular pattern in the decentralized finance — the CDP (collateralized debt position)13 min read·May 22, 2023--1--1