0xrafasec
HomeCVE deep-divesAll articlesToolsLearningAbout
HomeCVE deep-divesAll articlesToolsLearningAbout

Articles tagged "decentralized_systems_security"

Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security

AMM Invariant Drift: How Fee Accumulation and Donation Attacks Break Constant-Product Assumptions

The constant-product invariant — `x * y = k` — is the mathematical backbone of every Uniswap V2-style AMM. It is elegant, deterministic, and, in pure mathematical terms, unbreakable.

Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security

IBC Channel Security: How Unordered Channels Enable Cross-Chain Replay Attacks on Cosmos

The Inter-Blockchain Communication protocol (IBC) is one of the most sophisticated pieces of engineering in the blockchain space.

Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Decentralized Systems SecurityAdvanced
ArticleDecentralized Systems Security

Threshold Signature Ceremony Attacks: How a Single Malicious Participant Biases Key Generation in FROST

MPC wallets have become the infrastructure layer of institutional crypto custody. The promise is compelling: no single key, no single point of failure.

Feb 18, 2026
tutorialsecurityadvanceddecentralized_systems_security
0xrafasec

Security research, decoded. CVE deep-dives, vulnerability analysis, ethical hacking. No fluff.

Links

  • Home
  • All articles
  • Tools
  • Learning
  • About
  • RSS Feed

Connect

Subscribe to the newsletter

Get the latest security research and CVE analysis delivered to your inbox.

© 2026 0xrafasec. All rights reserved.