Base Token Launch Exploited by Same-Block Snipers Securing 26 Percent Supply
The exploitation of 200-millisecond block times via high-fee bidding establishes an asymmetric risk profile for all public token launches.
Sublinear Vector Commitments Enable Trustless Stateless Data Availability
A new vector commitment scheme allows light clients to verify massive datasets with logarithmic communication, fundamentally solving the stateless data availability problem.
Renzo Protocol’s ezETH Liquid Restaking Token Captures Significant DeFi Capital
The ezETH liquid restaking primitive abstracts EigenLayer complexity, creating a capital-efficient derivative that unlocks new composability across the DeFi vertical.
Provably Secure Tethering of Blockchains with Primary Chain Stake
Aegis introduces a provably safe and live protocol for securing expansion chains with primary-chain stake, resolving security challenges posed by dynamic validator withdrawals.
Mellow LRT Launches Modular Restaking Vaults on Symbiotic Protocol
Mellow's permissionless vault architecture decentralizes restaking risk selection, immediately capturing $116 million in initial liquidity.
Credit Market Protocol Exploited via Smart Contract Vulnerability on Optimism
An internal contract flaw on the Optimism credit market allowed an attacker to siphon assets, underscoring systemic DeFi risk.
Abracadabra Lending Protocol Drained $13 Million via Faulty GMX Integration Logic
Inter-protocol accounting failure in the GMX V2 integration allowed an attacker to bypass solvency checks and siphon $13M via self-liquidation.
Formalizing Practical Security Risks in Zero-Knowledge Proof Implementations
This work shifts focus from theoretical SNARK security to a taxonomy of 141 real-world vulnerabilities, enabling robust, end-to-end ZK system design.
