How to Calculate Funds at Risk
When submitting a bug report, the most important step a whitehat can take is to prove the magnitude of the bug’s impact. The higher the rea
When submitting a bug report, the most important step a whitehat can take is to prove the magnitude of the bug’s impact. The higher the rea
Introduction The Platypus Finance protocol was hacked on February 16, 2023, resulting in a loss of about $8.5m in stablecoin collateral to
Introduction The BonqDAO protocol was hacked on February 1st, 2023, losing around $120m in funds to a price oracle manipulation attack. A v
Introduction On October 7th, 2022, the Binance Bridge was hacked due to a flaw in the IAVL Merkle proof verification system, which allowed
Introduction One of the key skills that separates advanced hackers from beginners is the ability to write a proof of concept (PoC). A PoC i
Joran Honig sprung from the womb in 2018 as a fully-fledged ConsenSys Diligence tool builder and has become one of the most feared whitehats