DEV Community

Blockchain

A decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that are used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
The Share Inflation Kill Chain: How Three Lines of Missing Code Keep Draining DeFi Lending Protocols

The Share Inflation Kill Chain: How Three Lines of Missing Code Keep Draining DeFi Lending Protocols

Comments
6 min read
From Zero to GenLayer: Connecting Your dApp with Next.js and genlayer-js (Part 3/3)

From Zero to GenLayer: Connecting Your dApp with Next.js and genlayer-js (Part 3/3)

Comments
9 min read
From Zero to GenLayer: Why Smart Contracts Need AI (Part 1/3)

From Zero to GenLayer: Why Smart Contracts Need AI (Part 1/3)

Comments
8 min read
From Zero to GenLayer: Writing Your First Intelligent Contract in Python (Part 2/3)

From Zero to GenLayer: Writing Your First Intelligent Contract in Python (Part 2/3)

Comments
10 min read
From Zero to GenLayer: Hands-On Tutorial to Build an Intelligent Contract dApp

From Zero to GenLayer: Hands-On Tutorial to Build an Intelligent Contract dApp

1
Comments
9 min read
Opening the Playbook: Why We're Open-Sourcing Casper's Core DeFi Infrastructure

Opening the Playbook: Why We're Open-Sourcing Casper's Core DeFi Infrastructure

3
Comments
9 min read
Zombie Contracts: The $100M+ Time Bomb Hiding in DeFi's Forgotten Smart Contracts

Zombie Contracts: The $100M+ Time Bomb Hiding in DeFi's Forgotten Smart Contracts

Comments
6 min read
Oracle Security Design Patterns: 5 Defensive Layers Every DeFi Protocol Needs After the $10M YieldBloxDAO Drain

Oracle Security Design Patterns: 5 Defensive Layers Every DeFi Protocol Needs After the $10M YieldBloxDAO Drain

Comments
5 min read
The Windsurf IDE Trojan: How a Fake Extension Turns the Solana Blockchain Into a Bulletproof Credential Exfiltration Pipeline

The Windsurf IDE Trojan: How a Fake Extension Turns the Solana Blockchain Into a Bulletproof Credential Exfiltration Pipeline

Comments
6 min read
The Neutrl DNS Hijack: 7 Domain Defense Layers Every DeFi Protocol Must Deploy Today

The Neutrl DNS Hijack: 7 Domain Defense Layers Every DeFi Protocol Must Deploy Today

Comments
7 min read
Solana Memo Program as Malware C2: Inside the GlassWorm Supply Chain Attack That Weaponized the Blockchain

Solana Memo Program as Malware C2: Inside the GlassWorm Supply Chain Attack That Weaponized the Blockchain

1
Comments
5 min read
Flash Loans: How Aave Turned Instant Liquidity Into a $25M Problem

Flash Loans: How Aave Turned Instant Liquidity Into a $25M Problem

1
Comments
4 min read
ERC-20 vs ERC-721 vs ERC-1155: When to Use Each Token Standard

ERC-20 vs ERC-721 vs ERC-1155: When to Use Each Token Standard

1
Comments
4 min read
OWASP Smart Contract Top 10: 2026 — The Practical Defense Guide Nobody Wrote Yet

OWASP Smart Contract Top 10: 2026 — The Practical Defense Guide Nobody Wrote Yet

Comments
4 min read
Hot Wallet Security Architecture: What Every Crypto Platform Must Learn From Bitrefill's Lazarus Group Breach

Hot Wallet Security Architecture: What Every Crypto Platform Must Learn From Bitrefill's Lazarus Group Breach

Comments
7 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.