Skip to main content

133 posts tagged with "Security"

Cybersecurity, smart contract audits, and best practices

View all tags

zkTLS: How Zero-Knowledge Transport Layer Security Is Rewriting the Rules of Online Identity

· 8 min read
Dora Noda
Software Engineer

What if you could prove you earn over $100,000 a year, hold a valid passport, or have an 800 FICO credit score — all without showing a single document? That is the promise of zkTLS, and in 2026, it is rapidly moving from cryptographic theory to production infrastructure.

Zero-Knowledge Transport Layer Security (zkTLS) extends the encryption protocol that already secures nearly every website you visit. Instead of merely protecting data in transit, zkTLS generates mathematical proofs that specific data came from a verified source — without ever exposing the underlying information. The result is a bridge between the locked vaults of Web2 data and the composable, permissionless world of Web3.

Gondi's $230K NFT Lending Exploit: How a Missing Caller Check Drained 78 Blue-Chip NFTs

· 7 min read
Dora Noda
Software Engineer

A single missing authorization check. Seventeen days undetected. Seventy-eight blue-chip NFTs — including Art Blocks, Doodles, and Beeple pieces — siphoned from wallets that never initiated a transaction. The Gondi exploit of March 9, 2026 is a masterclass in how "convenience features" can become attack surfaces, and why the NFT lending sector faces security challenges that fungible-token DeFi never had to confront.

The $50M AAVE Swap Disaster: When DeFi 'Working as Designed' Costs a Whale Everything

· 10 min read
Dora Noda
Software Engineer

On March 12, 2026, a single Ethereum transaction turned $50.4 million in USDT into 327 AAVE tokens worth roughly $36,000. The loss was not caused by a hack, an exploit, or a smart contract bug. Every protocol involved — Aave, CoW Swap, SushiSwap — functioned exactly as designed. The user confirmed a 99.9% price impact warning on a mobile device, checked a box, and watched nearly fifty million dollars evaporate into MEV bots in under thirty seconds.

This incident is the most expensive UX failure in DeFi history, and it forces an uncomfortable question: if permissionless systems "working as designed" can destroy this much value, who is responsible for preventing it?

The $128M Rounding Error: How a Sub-Penny Math Bug Drained DeFi's Oldest AMM Across Nine Chains

· 10 min read
Dora Noda
Software Engineer

Eight wei. That is roughly 0.000000000000000008 of a token — a quantity so small it has no meaningful dollar value. Yet on November 3, 2025, an attacker turned rounding errors at that scale into $128 million in stolen assets, draining Balancer's Composable Stable Pools across nine blockchains in under thirty minutes.

The Balancer V2 exploit is now the largest single-vulnerability, multi-chain DeFi exploit in history. It wiped 52% of Balancer's total value locked overnight, survived more than ten security audits by the industry's top firms, and forced one chain — Berachain — to execute an emergency hard fork just to claw back funds. The vulnerability? A single line of code that rounded in the wrong direction.

CrossCurve's $3M Bridge Exploit: How One Missing Validation Check Drained a Multi-Chain Protocol in Minutes

· 8 min read
Dora Noda
Software Engineer

It took less than an hour. On January 31, 2026, an attacker discovered that a single smart contract function on CrossCurve's bridge infrastructure lacked a critical validation check — and systematically drained $3 million across Ethereum, Arbitrum, and other networks before anyone could react. No sophisticated zero-day. No insider key compromise. Just a fabricated message and a function call that anyone on the blockchain could make.

The CrossCurve incident is a stark reminder that cross-chain bridges remain the most dangerous attack surface in decentralized finance — and that even protocols boasting multi-layered security architectures can collapse when a single contract falls through the cracks.

Google Cloud's MCP Web3 Security Framework: How to Keep AI Agents from Draining Your Wallet

· 8 min read
Dora Noda
Software Engineer

AI agents that can autonomously trade tokens, rebalance DeFi positions, and pay for their own compute sound revolutionary — until one gets prompt-injected into sending your life savings to an attacker. Google Cloud's newly published MCP Web3 security framework tackles exactly this nightmare, laying out an enterprise-grade blueprint for securing Model Context Protocol agents that interact with blockchains.

Here is what the framework recommends, why it matters, and how it stacks up against competing approaches from Coinbase, Ledger, and the emerging x402 payment standard.

Venus Protocol's $3.7M Heist: How a Nine-Month Plot Exploited a Known Vulnerability on BNB Chain

· 8 min read
Dora Noda
Software Engineer

A security audit flagged the exact attack vector months earlier. The team dismissed it. On Sunday, an attacker walked away with $3.7 million.

Venus Protocol, the dominant lending platform on BNB Chain with roughly $1.47 billion in total value locked, suffered a devastating price manipulation exploit on March 15, 2026. The attacker targeted THE — the native token of decentralized exchange Thena — inflating its price from $0.27 to nearly $5 through a carefully orchestrated loop of deposits, borrows, and purchases. The result: over $3.7 million drained in BTC, CAKE, USDC, and BNB, with approximately $2.15 million persisting as unrecoverable bad debt.

What makes this attack remarkable is not just its scale, but the patience behind it — and the fact that the vulnerability was hiding in plain sight.

Multi-Agent Trust Architecture: How TEE-Backed Wallets Solve the 'Autonomous Agent Can't Be Trusted' Problem

· 9 min read
Dora Noda
Software Engineer

Every week in 2026, another startup announces an "autonomous AI agent" that can trade crypto, manage DeFi positions, or govern DAOs. But here is the question nobody wants to answer: why should anyone trust a piece of software with real money?

The industry's answer is converging on a surprisingly elegant stack — Trusted Execution Environments (TEEs), on-chain identity registries, and programmable guardrails — that turns "trust the agent" into "verify the agent." In the span of three months, Coinbase shipped Agentic Wallets, MoonPay integrated Ledger hardware signing for AI agents, and the Ethereum Foundation ratified two new standards (ERC-8004 and ERC-8183) that together form the skeleton of a machine-native trust layer. This article maps the architecture that is quietly making autonomous agents bankable.

From 'Code Is Law' to 'Spec Is Law': How Formal Verification Could End DeFi's $3.4 Billion Exploit Crisis

· 9 min read
Dora Noda
Software Engineer

A single rounding error — a sub-penny precision loss in Solidity's integer division — drained $128 million from Balancer across nine blockchains in under 30 minutes. The pools had been live for years. Multiple audits had reviewed the code. Nobody caught it. This is the state of DeFi security in 2026: billions of dollars protected by a paradigm that has demonstrably, repeatedly failed.

Now a16z crypto is proposing a radical rethink. In their 2026 "Big Ideas" report, the venture firm argues that the industry must abandon "code is law" — the foundational belief that deployed smart contract code is the ultimate authority — and replace it with "spec is law," where mathematically defined safety properties become the enforceable standard. The shift could fundamentally reshape how protocols are built, audited, and defended.