Top 10 Blockchain Hacking Techniques 2023
Top 10 Blockchain Hacking Techniques. The smart contract exploits of 2023 often use creative and...
We’re doubling down on open source and sunsetting Defender
on July 1, 2026. Read more
Top 10 Blockchain Hacking Techniques. The smart contract exploits of 2023 often use creative and...
After a successful beta phase, we are thrilled to announce the General Availability (GA) release of...
The Ion Protocol implements a borrowing and lending platform for liquid staking tokens (LSTs).
OpenZeppelin and Arbitrum are joining forces in a groundbreaking partnership to introduce a new era...
ERC-4337 is a specification to add account abstraction functionality to the Ethereum mainnet...
The Across protocol is a cross-chain bridge that allows for quickly bridging ERC-20 tokens from any...
One of the main pillars of secure applications is writing clean code. This is practiced through...
Linea is a ZK rollup that executes L2 transactions, publishes the associated data, and then proves...
UMA is a platform that allows users to enter trust-minimized financial contracts on the Ethereum...
A central feature of the system is the 'table' abstraction which represents a structured way to...
The MUD system provides a cohesive range of standard and extensible functionality to quickly...
UniswapV3 is an Automated Market Maker (AMM) that allows users to buy tokens from token-specific...