Functional Adaptor Signatures Enable Private Verifiable On-Chain Data Sales
Functional Adaptor Signatures bridge atomic payment with functional encryption, enabling trustless, privacy-preserving sales of computed data on any blockchain.
XRP Ledger Unlocks Native Layer One Smart Contracts on AlphaNet for Developers
The introduction of native Layer 1 smart contracts on the high-uptime XRP Ledger dramatically expands the design space for composable, low-latency dApps across DeFi and gaming.
Lending Protocol Drained via Oracle Price Feed Manipulation on Base
Critical oracle failure on Base allowed asset mispricing, enabling immediate, under-collateralized fund extraction from the lending pool.
R25 Launches Yield-Bearing Real-World Asset Token on Polygon DeFi
The R25 protocol introduces rcUSD+, an institutional-grade RWA primitive that injects compliant, sustainable yield into the Polygon application layer.
Firelight Protocol Unlocks Liquid Staking for XRP Holders on Flare Network
The introduction of liquid stXRP transforms a $83.5M locked asset base into a composable primitive, boosting Flare's capital efficiency.
Abracadabra Lending Protocol Drained $13 Million via Faulty GMX Integration Logic
Inter-protocol accounting failure in the GMX V2 integration allowed an attacker to bypass solvency checks and siphon $13M via self-liquidation.
Sierra Protocol Launches Dynamically Rebalancing Liquid Yield Token on Avalanche Network
The new Liquid Yield Token architecture dynamically blends institutional RWA with DeFi yield, establishing a superior, capital-efficient primitive for permissionless stablecoin liquidity.
Balancer V2 Pools Drained Exploiting Smart Contract Authorization Flaw
A critical access control failure in the V2 vault's callback logic permitted unauthorized asset manipulation across composable stable pools.
Formalizing Maximal Extractable Value Theory for Security Proofs
A new abstract model of blockchain execution formally defines Maximal Extractable Value (MEV), shifting the field from empirical observation to rigorous security proofs.
