PolgemyinDecurityTypical vulnerabilities in AMM protocolsThis article discusses the fundamental security aspects of the AMM (automatic market maker) protocols.Aug 7, 20231Aug 7, 20231
PolgemyinDecurityTypical vulnerabilities in LSD protocolsIn this article, we will examine the security aspects of widely used Liquid Staking Derivatives (LSD) protocols.Jun 6, 2023Jun 6, 2023
PolgemyinDecurityTypical vulnerabilities in lending and CDP protocolsThis article explains the security of a popular pattern in the decentralized finance — the CDP (collateralized debt position)May 22, 20231May 22, 20231