Articles tagged "intermediate"
Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security
AMM Invariant Drift: How Fee Accumulation and Donation Attacks Break Constant-Product Assumptions
The constant-product invariant — `x * y = k` — is the mathematical backbone of every Uniswap V2-style AMM. It is elegant, deterministic, and, in pure mathematical terms, unbreakable.
Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Decentralized Systems SecurityIntermediate
ArticleDecentralized Systems Security
IBC Channel Security: How Unordered Channels Enable Cross-Chain Replay Attacks on Cosmos
The Inter-Blockchain Communication protocol (IBC) is one of the most sophisticated pieces of engineering in the blockchain space.
Feb 18, 2026
tutorialsecurityintermediatedecentralized_systems_security
Network & InfrastructureIntermediate
ArticleNetwork & Infrastructure
IPv6 Rogue Router Advertisements: Hijacking Windows and Linux Hosts on Dual-Stack Networks
Most security teams have a coherent IPv4 policy. Firewalls, DHCP snooping, ARP inspection — the usual suspects are configured and audited.
Feb 18, 2026
tutorialsecurityintermediatenetwork_and_infra