Homepage
Open in app
Sign in
Get started
Decurity
Full-stack web3 security services delivered by top-tier ethical hackers with a focus on the real financial impact
Research
Audit Reports
Follow
Following
Web2.5 Security
Web2.5 Security
This is an article about pentesting blockchain infrastructure, wallets, and custodial apps. We did numerous security reviews of such…
Omar Ganiev
Mar 4
Typical vulnerabilities in AMM protocols
Typical vulnerabilities in AMM protocols
This article discusses the fundamental security aspects of the AMM (automatic market maker) protocols.
Polgemy
Aug 7, 2023
Dx Protocol Vulnerability Disclosure: Mitigation of a $5,200,000 Smart Contract Exploit
Dx Protocol Vulnerability Disclosure: Mitigation of a $5,200,000 Smart Contract Exploit
A curious story about how our researcher looked up a seemingly random smart contract and ended up saving $5,200,000 USD a few hours later
Lockigod
Jul 6, 2023
Typical vulnerabilities in LSD protocols
Typical vulnerabilities in LSD protocols
In this article, we will examine the security aspects of widely used Liquid Staking Derivatives (LSD) protocols.
Polgemy
Jun 6, 2023
Typical vulnerabilities in lending and CDP protocols
Typical vulnerabilities in lending and CDP protocols
This article explains the security of a popular pattern in the decentralized finance — the CDP (collateralized debt position)
Polgemy
May 22, 2023
Stealing gas tokens from the GSN-enabled MultiSig
Stealing gas tokens from the GSN-enabled MultiSig
During August 20–21 we’ve collaborated with our friends Vlad Isenbaev and Hexens and participated in one of the world hardest smart…
Omar Ganiev
Aug 23, 2022
All your staking rewards are belong to us
All your staking rewards are belong to us
This is a write-up of a critical vulnerability found by Decurity during the audit of Giveth smart contracts conducted together with…
Arseniy Reutov
Jun 27, 2022
About Decurity
Latest Stories
Archive
About Medium
Terms
Privacy
Teams