Articles in Decentralized Systems Security
Filter by category
Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security
AMM Invariant Drift: How Fee Accumulation and Donation Attacks Break Constant-Product Assumptions
The constant-product invariant — `x * y = k` — is the mathematical backbone of every Uniswap V2-style AMM. It is elegant, deterministic, and, in pure mathematical terms, unbreakable.
Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security
IBC Channel Security: How Unordered Channels Enable Cross-Chain Replay Attacks on Cosmos
The Inter-Blockchain Communication protocol (IBC) is one of the most sophisticated pieces of engineering in the blockchain space.
Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Decentralized Systems SecurityAdvanced
ArticleDecentralized Systems Security
Threshold Signature Ceremony Attacks: How a Single Malicious Participant Biases Key Generation in FROST
MPC wallets have become the infrastructure layer of institutional crypto custody. The promise is compelling: no single key, no single point of failure.
Feb 18, 2026
tutorialsecurityadvanceddecentralized_systems_security