Build secure Uniswap V4 Hooks in AVS
In recent months, both Uniswap V4 and EigenLayer’s Actively Validated Services (AVS) have gained significant attention – not without reason. Uniswap V4 introduced a […]

In recent months, both Uniswap V4 and EigenLayer’s Actively Validated Services (AVS) have gained significant attention – not without reason. Uniswap V4 introduced a […]
This vulnerability allows anyone to make a cross-chain calls with multiple compose messages, and execute the messages (all except the first one) as the […]
The user can use a nested MSG_REMOTE_TRANSFER message in a valid MSG_REMOTE_TRANSFER to execute back the remote transfer as the owner of tokens (stealing […]
The executeModule function allows anyone to execute any module with any params. That allows attacker to execute operations on behalf of other users. Vulnerability […]
The function executes modules depending on the _msgType parameter and some of them do not accept the _srcChainSender parameter. Vulnerability Details The _toeComposeReceiver function is called […]
When a holder has the SOFT_RESTRICTED_STAKER_ROLE, they can exchange theirstUSDe for USDe using StakedUSDeV2 despite the protocol requirement. Vulnerability Details The Ethena readme has […]
A restricted user can approve another address and redeem their USDe despite being restricted. Vulnerability Details The StakedUSDe contract implements a method to SOFTLY […]
Let us help
Get throughly tested by the creators of Smart Contract Security Verification Standard