Composable SecurityUniswap v4 — threat modeling for secure integrationVision behind Uniswap V4 and team approachJan 26Jan 26
Composable SecurityAccount Abstraction — a tale on the evolution of walletsTrust, convenience, and security are just a few values from Sir Codelot’s knightly ethos. Let’s find out what they turned into.Jan 26Jan 26
Composable SecurityThe Role of Access Control in Solidity Smart ContractsOnce upon a time, in the mythical land of Soliditium, a courageous knight named Sir Codelot embarked on a grand mission.Jan 15Jan 15
Composable SecurityUnderstanding the Tornado Cash Governance AttackIn the rapidly evolving world of decentralized finance (DeFi), the recent attack on Tornado Cash’s Governance community stands as a stark…Jan 15Jan 15
Composable Security6 security sins of Web3 bridgesBridge exploits account for ~50% of all decentralized finance exploits since September 2020, totaling ~$2.5B in lost assets, according to…Jan 4Jan 4
Composable SecurityKey threat-based cross-checksOften projects do not carry out cross-checks due to the limited budget and the high cost of a smart contract audit — but there is a way.Jan 4Jan 4
Composable SecurityHow we do smart contract auditFind out what the price of the smart contract audit consists of, when to perform it, and what the auditing process and report it should…Jan 3Jan 3
Composable SecurityShapella, EIP-4895, and challenges faced by staking protocolsThe important change following the upgrade is the launch of withdrawals for staked ETH. Although this gives a lot of new opportunities, we…Jan 3Jan 3
Composable SecurityDeFi price oracles — all you should know about a TWAPIn traditional finance, there are many different measures of an asset’s average price. It is advisable to be aware of those mechanisms in…Jan 3Jan 3
Composable SecurityWOW! ChatGPT-driven threat modeling for smart contractsLeveraging ChatGPT for advanced threat modeling in smart contracts.Dec 28, 2023Dec 28, 2023