ERC-8004: a practical explainer for trustless agents
For agents to cooperate with each other, they need to know about the existence of other agents, what abilities they have, and to be […]
For agents to cooperate with each other, they need to know about the existence of other agents, what abilities they have, and to be […]
Below are practical green flags and red flags you can verify yourself using a project’s website, documentation, and a blockchain explorer. Each flag includes […]
Yield bearing stablecoins are tokens designed to hold a peg while earning interest for holders. Sounds good, right? However, where there’s yield, there’s also […]
What do Lido, Red Stone, YieldNest, and Braintrust have in common? They’ve developed effective methods for improving security without drastically increasing costs. Top-tier protocol […]
Bypassing the border epoch as determined by the mass slashing event. Vulnerability Details During a mass slashing event, the withdrawal queue may delay finalization […]
The report generation cannot be completed and submitted due to this bug. Vulnerability Details The get_remaining_forced_validators function is designed to remove validators that are […]
The standard rewards distribution process (as recommended by the CLI) fails, resulting in gas loss for the AVS manager. Vulnerability Details The OperatorDirectedRewardsSubmission struct […]
Operators face the risk of losing rewards on the default L2 and also jeopardizesubsequent rewards on the non-default L2. Vulnerability Details The AVSGovernance contract […]
Permanent blockage in the rewards distribution process. Vulnerability Details In the AVSGovernance contract, when processing a payment request from the AttestationCenter contract, the function […]
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard