DEV Community

ohmygod profile picture

ohmygod

404 bio not found

Joined Joined on 
The 2026 DeFi Pre-Launch Security Checklist: 7 Attack Surfaces Your Audit Probably Missed

The 2026 DeFi Pre-Launch Security Checklist: 7 Attack Surfaces Your Audit Probably Missed

Comments
6 min read
Blockchain as Botnet: How Glassworm Turned Solana Memos Into an Unkillable C2 Channel — And How to Defend Your Pipeline

Blockchain as Botnet: How Glassworm Turned Solana Memos Into an Unkillable C2 Channel — And How to Defend Your Pipeline

Comments
6 min read
How AI-Assisted Whitehats Found Three Lido Vulnerabilities in Three Weeks — Build Your Own Bug Hunting Pipeline

How AI-Assisted Whitehats Found Three Lido Vulnerabilities in Three Weeks — Build Your Own Bug Hunting Pipeline

Comments
7 min read
Alpenglow 20+20 Security Model: Why Solana New Consensus Halves Byzantine Tolerance

Alpenglow 20+20 Security Model: Why Solana New Consensus Halves Byzantine Tolerance

Comments
5 min read
Donation Attacks Are Back: How Venus Lost $3.7M and sDOLA Lost $240K in One Month — A Defense Guide for Lending Protocols

Donation Attacks Are Back: How Venus Lost $3.7M and sDOLA Lost $240K in One Month — A Defense Guide for Lending Protocols

Comments
8 min read
The CrimeEnjoyor Epidemic: How EIP-7702 Delegation Phishing Drained 450K+ Wallets — And How to Detect It On-Chain

The CrimeEnjoyor Epidemic: How EIP-7702 Delegation Phishing Drained 450K+ Wallets — And How to Detect It On-Chain

Comments
6 min read
The Solv Protocol Double-Mint Exploit: How an ERC-3525 Callback Turned 135 Tokens Into 567 Million

The Solv Protocol Double-Mint Exploit: How an ERC-3525 Callback Turned 135 Tokens Into 567 Million

Comments
7 min read
Localized DoS on Solana: How Attackers Weaponize Fee Markets to Grief Individual Protocols for Pennies

Localized DoS on Solana: How Attackers Weaponize Fee Markets to Grief Individual Protocols for Pennies

Comments
5 min read
The Private Key Pandemic: Why 60% of 2026's DeFi Losses Come From Off-Chain Failures — And a Defense Blueprint

The Private Key Pandemic: Why 60% of 2026's DeFi Losses Come From Off-Chain Failures — And a Defense Blueprint

Comments
5 min read
Three Accounting Bugs That Drained $107K from DeFi Lending Protocols in One Week

Three Accounting Bugs That Drained $107K from DeFi Lending Protocols in One Week

Comments
7 min read
The Moonwell Oracle Exploit: How AI-Assisted 'Vibe Coding' Turned cbETH Into a $1.12 Token and Cost $1.78M

The Moonwell Oracle Exploit: How AI-Assisted 'Vibe Coding' Turned cbETH Into a $1.12 Token and Cost $1.78M

Comments
6 min read
Fuzzing Solana Programs with Trident: How Ackee's Open-Source Fuzzer Catches Bugs That Unit Tests Miss

Fuzzing Solana Programs with Trident: How Ackee's Open-Source Fuzzer Catches Bugs That Unit Tests Miss

Comments
7 min read
The CrossCurve Bridge Exploit: How a Missing Gateway Check Let Attackers Spoof Axelar Messages and Drain $3M

The CrossCurve Bridge Exploit: How a Missing Gateway Check Let Attackers Spoof Axelar Messages and Drain $3M

Comments
6 min read
Auditing for Ethereum's Parallel Execution Era: New Attack Vectors and a Foundry Toolkit for Glamsterdam

Auditing for Ethereum's Parallel Execution Era: New Attack Vectors and a Foundry Toolkit for Glamsterdam

Comments
6 min read
The BCE PancakeSwap Exploit: How Attackers Bypassed Buy/Sell Restrictions to Weaponize a Burn Mechanism for $679K

The BCE PancakeSwap Exploit: How Attackers Bypassed Buy/Sell Restrictions to Weaponize a Burn Mechanism for $679K

Comments
7 min read
The 84% Problem: Why Most Hacked DeFi Tokens Never Recover — And a Pre-Hack Survival Framework

The 84% Problem: Why Most Hacked DeFi Tokens Never Recover — And a Pre-Hack Survival Framework

Comments
6 min read
MCPwned: How the Model Context Protocol Is Becoming DeFi's Newest Attack Surface

MCPwned: How the Model Context Protocol Is Becoming DeFi's Newest Attack Surface

Comments
6 min read
Differential Testing for DeFi Protocol Forks: A Foundry Framework That Would Have Caught $50M in Exploits

Differential Testing for DeFi Protocol Forks: A Foundry Framework That Would Have Caught $50M in Exploits

Comments
7 min read
Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Flash Loan-Resistant Oracle Design: A 2026 Defense Playbook with Solidity Patterns

Comments
5 min read
CanisterWorm: How a Self-Propagating npm Worm Uses Blockchain C2 to Wipe Kubernetes Clusters

CanisterWorm: How a Self-Propagating npm Worm Uses Blockchain C2 to Wipe Kubernetes Clusters

Comments
6 min read
The Resolv Hack Autopsy: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

The Resolv Hack Autopsy: How a Compromised AWS Key Printed $25M in Unbacked Stablecoins

Comments
7 min read
ForceMemo: How Stolen Credentials Turned Hundreds of GitHub Python Repos Into Blockchain-Powered Malware Distributors

ForceMemo: How Stolen Credentials Turned Hundreds of GitHub Python Repos Into Blockchain-Powered Malware Distributors

Comments
6 min read
Building a Transfer Hook Exploit Scanner: Automated Detection of CPI Depth Bombs and Callback Reentrancy in Solana Token-2022

Building a Transfer Hook Exploit Scanner: Automated Detection of CPI Depth Bombs and Callback Reentrancy in Solana Token-2022

Comments
6 min read
The CrimeEnjoyor Epidemic: How EIP-7702 Delegation Phishing Drained 450K+ Wallets — And How to Detect It On-Chain

The CrimeEnjoyor Epidemic: How EIP-7702 Delegation Phishing Drained 450K+ Wallets — And How to Detect It On-Chain

Comments
6 min read
From Scanner to Stealer: How the Trivy Supply Chain Attack Targeted Crypto Wallets in 75+ CI/CD Pipelines

From Scanner to Stealer: How the Trivy Supply Chain Attack Targeted Crypto Wallets in 75+ CI/CD Pipelines

Comments
8 min read
Cross-Chain Bridge Security Checklist: 7 Lessons from $140M in Bridge Exploits (2025-2026)

Cross-Chain Bridge Security Checklist: 7 Lessons from $140M in Bridge Exploits (2025-2026)

Comments
2 min read
The ERC-2771 Identity Crisis: How DBXen's $150K Exploit Proves Meta-Transaction Security Is Still Broken in 2026

The ERC-2771 Identity Crisis: How DBXen's $150K Exploit Proves Meta-Transaction Security Is Still Broken in 2026

Comments
7 min read
The Venus Protocol Donation Attack: How an Attacker Turned $0.27 THE Tokens Into a $3.6M Payday

The Venus Protocol Donation Attack: How an Attacker Turned $0.27 THE Tokens Into a $3.6M Payday

Comments
5 min read
Mutation Testing for Smart Contracts: How Slither-Mutate + Foundry Reveals the Tests You Forgot to Write

Mutation Testing for Smart Contracts: How Slither-Mutate + Foundry Reveals the Tests You Forgot to Write

Comments
5 min read
The Confused Deputy Problem in Solana CPIs: 5 Patterns That Get Programs Drained

The Confused Deputy Problem in Solana CPIs: 5 Patterns That Get Programs Drained

Comments
5 min read
EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

EVMbench and the Arms Race: How AI Agents Are Rewriting Smart Contract Security — And What Defenders Must Do Now

Comments
4 min read
ERC-7683 Cross-Chain Intents: 7 Security Risks Every DeFi Developer Must Audit Before Deployment

ERC-7683 Cross-Chain Intents: 7 Security Risks Every DeFi Developer Must Audit Before Deployment

Comments
5 min read
Beyond Audits: A Practical Guide to DeFi Runtime Security Monitoring in 2026

Beyond Audits: A Practical Guide to DeFi Runtime Security Monitoring in 2026

Comments
6 min read
The Venus Protocol Donation Attack: How 9 Months of Patience Bypassed Three Lines of Defense

The Venus Protocol Donation Attack: How 9 Months of Patience Bypassed Three Lines of Defense

Comments
5 min read
When the Code Is Fine But the Team Gets Hacked: OpSec Lessons from Step Finance

When the Code Is Fine But the Team Gets Hacked: OpSec Lessons from Step Finance

Comments
4 min read
Solana Account Revival Attacks: How Closed Accounts Come Back to Haunt You

Solana Account Revival Attacks: How Closed Accounts Come Back to Haunt You

Comments
4 min read
Deposit Inflation Attacks: How One Bug Pattern Drained $4.5M Across Four Protocols in March 2026

Deposit Inflation Attacks: How One Bug Pattern Drained $4.5M Across Four Protocols in March 2026

Comments
1 min read
The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

The Transient Storage Trap: Why EIP-1153 Gas Savings Are Creating a New Generation of Smart Contract Vulnerabilities

Comments
4 min read
The Resolv USR Minting Exploit: How $100K in USDC Became $25M Through a Broken Swap Pipeline

The Resolv USR Minting Exploit: How $100K in USDC Became $25M Through a Broken Swap Pipeline

Comments
5 min read
DeFi Circuit Breakers: Engineering Rate Limits, Value Caps, and Kill Switches That Actually Save Money

DeFi Circuit Breakers: Engineering Rate Limits, Value Caps, and Kill Switches That Actually Save Money

Comments
6 min read
The Makina Finance Flash Loan Exploit: How $280M in Borrowed USDC Drained a Curve Pool in One Transaction

The Makina Finance Flash Loan Exploit: How $280M in Borrowed USDC Drained a Curve Pool in One Transaction

Comments
5 min read
DarkSword: The Zero-Click iOS Exploit Chain That's Draining Crypto Wallets in Under 60 Seconds

DarkSword: The Zero-Click iOS Exploit Chain That's Draining Crypto Wallets in Under 60 Seconds

Comments
6 min read
Solana's Alpenglow Security Trade-Off: How Dropping PoH for 150ms Finality Changes Every Assumption DeFi Developers Hold

Solana's Alpenglow Security Trade-Off: How Dropping PoH for 150ms Finality Changes Every Assumption DeFi Developers Hold

Comments
7 min read
Stablecoin Mint Path Auditing: A 12-Point Security Checklist After the $25M USR Exploit

Stablecoin Mint Path Auditing: A 12-Point Security Checklist After the $25M USR Exploit

1
Comments
7 min read
The Resolv USR Exploit: How a $100K Deposit Minted 80 Million Unbacked Stablecoins and Crashed USR 75%

The Resolv USR Exploit: How a $100K Deposit Minted 80 Million Unbacked Stablecoins and Crashed USR 75%

1
Comments
5 min read
The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

Comments
6 min read
The Noisy Neighbor Attack: How Solana's Localized Fee Markets Create a $0.50 Kill Switch for Any DeFi Protocol

The Noisy Neighbor Attack: How Solana's Localized Fee Markets Create a $0.50 Kill Switch for Any DeFi Protocol

Comments
7 min read
Signature Replay Across L2s: How One Permit2 Signature Can Drain Your Tokens on Every Chain Simultaneously

Signature Replay Across L2s: How One Permit2 Signature Can Drain Your Tokens on Every Chain Simultaneously

Comments
6 min read
The First 60 Minutes After a DeFi Exploit: A Battle-Tested Incident Response Playbook for 2026

The First 60 Minutes After a DeFi Exploit: A Battle-Tested Incident Response Playbook for 2026

1
Comments
7 min read
AI-Augmented Smart Contract Auditing: Building an Aderyn + MCP Pipeline That Catches What Manual Review Misses

AI-Augmented Smart Contract Auditing: Building an Aderyn + MCP Pipeline That Catches What Manual Review Misses

1
Comments
6 min read
The DBXen ERC2771 Exploit: How _msgSender() and msg.sender Confusion Turned 1,085 Staking Cycles Into Instant Cash

The DBXen ERC2771 Exploit: How _msgSender() and msg.sender Confusion Turned 1,085 Staking Cycles Into Instant Cash

Comments
5 min read
Building MEV-Resistant DeFi: A Practitioner's Guide to Protecting Protocols and Users From Value Extraction

Building MEV-Resistant DeFi: A Practitioner's Guide to Protecting Protocols and Users From Value Extraction

1
Comments
7 min read
The Resolv USR Exploit: How $200K Minted $80M in Stablecoins and What It Means for Mint Security

The Resolv USR Exploit: How $200K Minted $80M in Stablecoins and What It Means for Mint Security

Comments
7 min read
ERC-3525 Meets Reentrancy: How a Token Standard Interaction Turned 135 Tokens Into 567 Million in the Solv Protocol Exploit

ERC-3525 Meets Reentrancy: How a Token Standard Interaction Turned 135 Tokens Into 567 Million in the Solv Protocol Exploit

1
Comments
5 min read
When Your IDE Phones Home via Solana: How a Fake Windsurf Extension Turned the Blockchain Into a Command-and-Control Server

When Your IDE Phones Home via Solana: How a Fake Windsurf Extension Turned the Blockchain Into a Command-and-Control Server

Comments
6 min read
The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

The Anchor Constraint Security Checklist: 10 Validation Patterns That Prevent 90% of Solana Program Exploits

Comments
6 min read
Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Auditing Inherited Code: How to Detect Fork-Inherited Vulnerabilities Before They Become $7M Exploits

Comments
8 min read
Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

Cross-Chain Bridge Message Validation: 7 Defensive Patterns That Would Have Stopped the $3M CrossCurve Exploit

1
Comments
6 min read
The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

The Aave CAPO Oracle Incident: How a 2.85% Price Error Triggered $26M in Wrongful Liquidations

Comments
6 min read
MEV-Resistant Smart Contract Design: 5 Battle-Tested Patterns After the $50M Aave Slippage Catastrophe

MEV-Resistant Smart Contract Design: 5 Battle-Tested Patterns After the $50M Aave Slippage Catastrophe

Comments
6 min read
loading...