Nuno TeodoroinZokyo_ioBest Practices for Web3 Wallet SecurityWeb3 crypto wallet applications are the gateways to the decentralized world, enabling users to interact with blockchain networks, manage…Sep 30Sep 30
Nuno TeodoroinZokyo_ioPreparing for the Challenges of Smart Contract AuditsSecurity audits are essential, even for the most skilled developers. This is because audits bring fresh perspectives to the code that may…Sep 23Sep 23
Nuno TeodoroinZokyo_ioExploring AI Attacks: The Top 10 Vulnerabilities in Large Language Models (LLMs)As Large Language Models (LLMs) become increasingly integral to various applications, from chatbots to financial services, their…Sep 18Sep 18
Nuno TeodoroinZokyo_ioPenpie PostMortem: Analysis of the $27M Reentrancy ExploitThe Penpie platform — a farming protocol built atop Pendle — suffered a devastating reentrancy attack that led to the loss of $27 million…Sep 4Sep 4
Nuno TeodoroinZokyo_ioUnlocking Security: The Power of Penetration TestingAs the popularity of blockchain technology continues to rise, the security of crypto wallets — used to store and manage digital assets —…Aug 29Aug 29
Nuno TeodoroinZokyo_ioWhen Web2 meets Web3: Understanding Subdomain TakeoversGreetings! Chris here again, your friendly neighborhood whitehat from Zokyo Labs, bringing you another article about security.Aug 29Aug 29
Nuno TeodoroinZokyo_ioEnsuring Consistency: The Role of Invariant Testing in CybersecurityInvariant testing is one of the essential techniques used to ensure that smart contracts maintain their core properties under all…Aug 12Aug 12
Nuno TeodoroExplaining Bitcoin to friends and familyHow to get grandma to finally understand Bitcoin.Oct 18, 2023Oct 18, 2023