DEV Community

ohmygod profile picture

ohmygod

404 bio not found

Joined Joined on 
Zombie Accounts: How Solana's Garbage Collection Gap Enables Revival Attacks That Drain Programs

Zombie Accounts: How Solana's Garbage Collection Gap Enables Revival Attacks That Drain Programs

Comments
7 min read
Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Death by a Thousand Rounds: How Balancer V2 Lost $128M to a Rounding Error

Comments
7 min read
EVMbench Changed the Game: How to Use OpenAI Paradigm's Security Benchmark to Level Up Your Smart Contract Audits

EVMbench Changed the Game: How to Use OpenAI Paradigm's Security Benchmark to Level Up Your Smart Contract Audits

Comments
5 min read
Formal Verification for DeFi Developers: Halmos vs Certora vs HEVM — When Fuzzing Isn't Enough

Formal Verification for DeFi Developers: Halmos vs Certora vs HEVM — When Fuzzing Isn't Enough

Comments
5 min read
Web2 Is Still Web3's Kill Switch: Dissecting the Bonk.fun Domain Hijack That Drained Solana Wallets

Web2 Is Still Web3's Kill Switch: Dissecting the Bonk.fun Domain Hijack That Drained Solana Wallets

Comments
5 min read
Inherited Poison: How SagaEVM Lost $7M to an Ethermint Precompile Bug It Didn't Write

Inherited Poison: How SagaEVM Lost $7M to an Ethermint Precompile Bug It Didn't Write

Comments
7 min read
Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Token Approval Hygiene in 2026: Why Your Old approve(MAX_UINT256) Is a Ticking Time Bomb

Comments
6 min read
The Invisible Attack Surface: How Supply-Chain Hijacks Are Draining DeFi Users Without Touching Smart Contracts

The Invisible Attack Surface: How Supply-Chain Hijacks Are Draining DeFi Users Without Touching Smart Contracts

1
Comments
8 min read
MEV Protection on Solana in 2026: A Developer's Complete Guide to Defending Users Against Sandwich Attacks

MEV Protection on Solana in 2026: A Developer's Complete Guide to Defending Users Against Sandwich Attacks

Comments
7 min read
The Solv Protocol Double-Mint Autopsy: How ERC-3525's Hidden ERC-721 Callback Created a $2.7M Reentrancy Exploit

The Solv Protocol Double-Mint Autopsy: How ERC-3525's Hidden ERC-721 Callback Created a $2.7M Reentrancy Exploit

Comments
5 min read
Cross-Chain State Contamination: How the Finality Gap Is Becoming DeFi's Most Dangerous Attack Surface in 2026

Cross-Chain State Contamination: How the Finality Gap Is Becoming DeFi's Most Dangerous Attack Surface in 2026

Comments
5 min read
Read-Only Reentrancy Is Still Draining DeFi in 2026: A Defense Playbook for Protocol Developers

Read-Only Reentrancy Is Still Draining DeFi in 2026: A Defense Playbook for Protocol Developers

1
Comments
4 min read
The Liquidation Game: How Whale Traders Are Weaponizing Perp DEX Mechanics to Extract Millions

The Liquidation Game: How Whale Traders Are Weaponizing Perp DEX Mechanics to Extract Millions

Comments
7 min read
The Solana Security Toolbox in 2026: A Practitioner's Guide to Fuzzing, Static Analysis, and AI-Powered Auditing

The Solana Security Toolbox in 2026: A Practitioner's Guide to Fuzzing, Static Analysis, and AI-Powered Auditing

1
Comments
6 min read
Post-Quantum DeFi: How to Prepare Your Smart Contracts Before Quantum Computers Break Ethereum's Cryptography

Post-Quantum DeFi: How to Prepare Your Smart Contracts Before Quantum Computers Break Ethereum's Cryptography

Comments
7 min read
The $500M Oversight: How a Missing Validation Check in Injective Let Anyone Drain Any Account

The $500M Oversight: How a Missing Validation Check in Injective Let Anyone Drain Any Account

Comments
6 min read
Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Solana Restaking Security in 2026: The Hidden Risk Surface of NCNs, VRTs, and the Coming Slashing Era

Comments
7 min read
The CPI Trust Boundary: 7 Ways Solana Cross-Program Invocations Betray You (And How to Lock Them Down)

The CPI Trust Boundary: 7 Ways Solana Cross-Program Invocations Betray You (And How to Lock Them Down)

Comments
7 min read
The Step Finance Autopsy: Why $27M in Audited Contracts Died From a Phishing Email

The Step Finance Autopsy: Why $27M in Audited Contracts Died From a Phishing Email

Comments
7 min read
The Venus Protocol Supply Cap Bypass: How a 9-Month Campaign and a 'Donation Attack' Drained $3.7M on BNB Chain

The Venus Protocol Supply Cap Bypass: How a 9-Month Campaign and a 'Donation Attack' Drained $3.7M on BNB Chain

1
Comments
6 min read
Building Custom Forta Detection Bots: How Real-Time Monitoring Could Have Saved $56M in March 2026 DeFi Exploits

Building Custom Forta Detection Bots: How Real-Time Monitoring Could Have Saved $56M in March 2026 DeFi Exploits

1
Comments
9 min read
ERC-4626 Vault Inflation Attacks Still Aren't Solved: Lessons From the sDOLA Llamalend Exploit

ERC-4626 Vault Inflation Attacks Still Aren't Solved: Lessons From the sDOLA Llamalend Exploit

Comments
4 min read
Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Beyond Property Testing: How Coverage-Guided Fuzzing Is Rewriting the Smart Contract Security Playbook in 2026

Comments
4 min read
Transient Storage Reentrancy: Why EIP-1153 Broke Your Security Assumptions (And How to Fix Them)

Transient Storage Reentrancy: Why EIP-1153 Broke Your Security Assumptions (And How to Fix Them)

Comments
6 min read
The Phantom Challenge: How a Missing Hash Input in Solana's ZK Proofs Could Have Minted Unlimited Tokens

The Phantom Challenge: How a Missing Hash Input in Solana's ZK Proofs Could Have Minted Unlimited Tokens

Comments
5 min read
Flash Loan Oracle Defense Patterns: What Every DeFi Developer Should Learn From Makina Finance's $4.2M Exploit

Flash Loan Oracle Defense Patterns: What Every DeFi Developer Should Learn From Makina Finance's $4.2M Exploit

Comments
9 min read
ERC-4337 Smart Account Security: 6 Deadly Mistakes That Let Attackers Drain Wallets Like Stealing a Private Key

ERC-4337 Smart Account Security: 6 Deadly Mistakes That Let Attackers Drain Wallets Like Stealing a Private Key

Comments
8 min read
Venus Protocol's THE Token Oracle Attack: Anatomy of a $2M Price Manipulation on BNB Chain

Venus Protocol's THE Token Oracle Attack: Anatomy of a $2M Price Manipulation on BNB Chain

Comments
5 min read
GlassWorm Dissected: How a Self-Propagating Worm Uses Solana as C2 Infrastructure to Compromise Developer Environments

GlassWorm Dissected: How a Self-Propagating Worm Uses Solana as C2 Infrastructure to Compromise Developer Environments

Comments
5 min read
Fuzzing DeFi Lending Invariants with Medusa: How Property-Based Testing Would Have Caught the Venus Protocol Exploit

Fuzzing DeFi Lending Invariants with Medusa: How Property-Based Testing Would Have Caught the Venus Protocol Exploit

Comments
4 min read
Cross-Chain Governance Attacks: How Flash-Loaned Voting Power Becomes the Next Nine-Figure Exploit

Cross-Chain Governance Attacks: How Flash-Loaned Voting Power Becomes the Next Nine-Figure Exploit

Comments
8 min read
Proxy Upgradeability Security: Why OWASP's Newest SC10:2026 Entry Cost the Industry $905M

Proxy Upgradeability Security: Why OWASP's Newest SC10:2026 Entry Cost the Industry $905M

Comments
4 min read
Auditing Solana CPI Chains: How Static Analysis Tools Catch the Vulnerabilities That Manual Review Misses

Auditing Solana CPI Chains: How Static Analysis Tools Catch the Vulnerabilities That Manual Review Misses

Comments
4 min read
The $50M Aave Slippage Catastrophe: Why DeFi Frontends Are the Last Line of Defense (And They're Failing)

The $50M Aave Slippage Catastrophe: Why DeFi Frontends Are the Last Line of Defense (And They're Failing)

Comments
5 min read
Deflationary Token Design Security: Why Flawed Burn Mechanisms Keep Getting Exploited in 2026

Deflationary Token Design Security: Why Flawed Burn Mechanisms Keep Getting Exploited in 2026

Comments
5 min read
The $17M Arbitrary External Call Exploit: How Unchecked call() Targets Drained SwapNet and Aperture Finance

The $17M Arbitrary External Call Exploit: How Unchecked call() Targets Drained SwapNet and Aperture Finance

Comments
6 min read
The 2026 Smart Contract Security Audit Toolkit: A Practitioner's Guide to Catching What AI and Humans Miss Alone

The 2026 Smart Contract Security Audit Toolkit: A Practitioner's Guide to Catching What AI and Humans Miss Alone

Comments
7 min read
Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Collateral Manipulation in DeFi Lending: How Venus Protocol Lost $3.7M to an Illiquid Token Exploit

Comments
4 min read
The Step Finance Autopsy: How a $40M Solana Protocol Died From Compromised Laptops, Not Buggy Code

The Step Finance Autopsy: How a $40M Solana Protocol Died From Compromised Laptops, Not Buggy Code

Comments
5 min read
DeFi Governance Under Siege: Flash Loan Voting, Proposal Hijacking, and the 2026 Defense Playbook

DeFi Governance Under Siege: Flash Loan Voting, Proposal Hijacking, and the 2026 Defense Playbook

Comments
7 min read
The 45-Second Crypto Heist: How a MediaTek Secure Boot Flaw Exposes 875 Million Android Wallets

The 45-Second Crypto Heist: How a MediaTek Secure Boot Flaw Exposes 875 Million Android Wallets

Comments
8 min read
Solana Program Security Checklist: 14 Critical Checks Before You Deploy to Mainnet

Solana Program Security Checklist: 14 Critical Checks Before You Deploy to Mainnet

1
Comments
8 min read
Transient Storage Security: How EIP-1153 Created DeFi's Newest and Most Misunderstood Attack Surface

Transient Storage Security: How EIP-1153 Created DeFi's Newest and Most Misunderstood Attack Surface

Comments
9 min read
From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake

From AirDrop to Cloud Heist: How North Korea's UNC4899 Stole Millions From a Crypto Firm Through a Single Developer's Mistake

Comments
7 min read
AI Smart Contract Auditors Compared: Sherlock AI vs Olympix vs Almanax vs QuillShield — Which One Actually Finds Bugs?

AI Smart Contract Auditors Compared: Sherlock AI vs Olympix vs Almanax vs QuillShield — Which One Actually Finds Bugs?

Comments
6 min read
The Solv Protocol Double-Mint Exploit: How ERC-3525's Hidden ERC-721 Callback Turned 135 Tokens Into $2.7M

The Solv Protocol Double-Mint Exploit: How ERC-3525's Hidden ERC-721 Callback Turned 135 Tokens Into $2.7M

Comments
1 min read
The Venus Protocol $3.7M Exploit: How an Illiquid Token Drained a Top-10 BNB Chain Lending Protocol Today

The Venus Protocol $3.7M Exploit: How an Illiquid Token Drained a Top-10 BNB Chain Lending Protocol Today

Comments
6 min read
The DeFi War Room: A Battle-Tested Incident Response Playbook for Protocol Teams Under Active Exploit

The DeFi War Room: A Battle-Tested Incident Response Playbook for Protocol Teams Under Active Exploit

Comments
7 min read
Solana Token-2022 Security: The Hidden Attack Surface in Token Extensions Every DeFi Protocol Must Address

Solana Token-2022 Security: The Hidden Attack Surface in Token Extensions Every DeFi Protocol Must Address

Comments
8 min read
The Curve LlamaLend Donation Attack: How a $240K Oracle Manipulation Exposed Soft-Liquidation's Achilles Heel

The Curve LlamaLend Donation Attack: How a $240K Oracle Manipulation Exposed Soft-Liquidation's Achilles Heel

Comments
5 min read
Uniswap V4 Hook Security: 8 Critical Attack Vectors Every DeFi Developer Must Audit Before Mainnet

Uniswap V4 Hook Security: 8 Critical Attack Vectors Every DeFi Developer Must Audit Before Mainnet

Comments
6 min read
The CrossCurve Bridge Heist: How Spoofed Axelar Messages Drained $3M Without a Single Legitimate Cross-Chain Transaction

The CrossCurve Bridge Heist: How Spoofed Axelar Messages Drained $3M Without a Single Legitimate Cross-Chain Transaction

Comments
8 min read
MEV Protection for DeFi Developers: A Practical Defense Playbook for EVM and Solana in 2026

MEV Protection for DeFi Developers: A Practical Defense Playbook for EVM and Solana in 2026

Comments
8 min read
EIP-7702 and the CrimeEnjoyor Epidemic: How Ethereum's Account Abstraction Upgrade Became an Attacker's Dream

EIP-7702 and the CrimeEnjoyor Epidemic: How Ethereum's Account Abstraction Upgrade Became an Attacker's Dream

Comments
3 min read
Solana Static Analysis in 2026: Eloizer vs L3X vs Sec3 X-ray vs Solana Fender — Finding Bugs Before Deployment

Solana Static Analysis in 2026: Eloizer vs L3X vs Sec3 X-ray vs Solana Fender — Finding Bugs Before Deployment

Comments
7 min read
The Gondi NFT Lending Exploit: How a Missing Ownership Check Let Attackers Drain 78 NFTs Worth $230K

The Gondi NFT Lending Exploit: How a Missing Ownership Check Let Attackers Drain 78 NFTs Worth $230K

1
Comments
5 min read
The YieldBlox $10M Oracle Heist: How a Single Trade on Stellar's DEX Drained an Entire Lending Pool

The YieldBlox $10M Oracle Heist: How a Single Trade on Stellar's DEX Drained an Entire Lending Pool

Comments
5 min read
The IoTeX Bridge Hack: Anatomy of a $4.4M Private Key Compromise That Exposed DeFi's Weakest Link

The IoTeX Bridge Hack: Anatomy of a $4.4M Private Key Compromise That Exposed DeFi's Weakest Link

1
Comments
6 min read
Building Custom Slither Detectors to Catch DeFi Access Control Flaws Before Attackers Do

Building Custom Slither Detectors to Catch DeFi Access Control Flaws Before Attackers Do

Comments
8 min read
The $5 Wrench Attack Goes Industrial: How Physical Security Became DeFi's Biggest Threat in 2026

The $5 Wrench Attack Goes Industrial: How Physical Security Became DeFi's Biggest Threat in 2026

1
Comments
7 min read
loading...