Blockchain-Secured Attribute Encryption for Verifiable, Payable Outsourced Decryption
Blockchain-based attribute encryption enables verifiable, fair outsourced decryption with zero-knowledge proofs, enhancing data privacy and efficiency.
Force Bridge Suffers $3.9 Million Private Key Compromise across Chains
Compromised private keys enabled unauthorized privileged function calls, draining multi-chain assets and exposing critical cross-chain bridge vulnerabilities.
Confidential EVM Enables Private Smart Contract Execution
Oasis Sapphire's confidential EVM, powered by hardware enclaves, enables private smart contract execution, overcoming public blockchain privacy limitations.
Cork Protocol Loses $12m to Flawed Token Redemption Logic
Inadequate validation in Cork Protocol's market creation logic enabled unauthorized token minting, leading to significant asset drain.
PlayDapp Suffers $290 Million Private Key Compromise, Token Minting Exploit
A compromised private key enabled unauthorized token minting, leading to a severe $290 million loss and critical supply inflation for PlayDapp.
Shibarium Bridge Exploited via Flash Loan and Validator Key Compromise
A critical vulnerability in Layer 2 bridge architecture, leveraging flash loan mechanics, allowed attackers to seize validator control and drain assets.
Nemo Protocol Market Pool Drained via Undisclosed Exploit
A lack of immediate root cause disclosure for a market pool drain highlights the inherent risks in nascent DeFi protocols.
Marginfi Protocol Vulnerability Averted, $160 Million Flash Loan Exploit Prevented
A critical collateral management flaw in Marginfi on Solana enabled unauthorized flash loans, risking $160M in liquidity manipulation.
Useful AI Tasks Secure Blockchain Consensus Sustainably
Proof of Useful Intelligence integrates AI task execution with blockchain security, transforming wasteful computation into valuable, verifiable intelligence for decentralized systems.
