Skip to main content

71 posts tagged with "Smart Contracts"

Smart contract development and security

View all tags

The $306M Phishing Tax: Why Crypto's Biggest Vulnerability Is No Longer Code

· 13 min read
Dora Noda
Software Engineer

In January 2026, one person picked up a phone call, answered what sounded like a routine support question, and lost $282 million in Bitcoin and Litecoin. No smart contract was exploited. No private key was cracked. No oracle was manipulated. The attacker just asked for the seed phrase, and the victim typed it in.

That single incident — now the largest social engineering heist in crypto history — represents more than half of all Q1 2026 losses tracked by Hacken, the Web3 security firm whose quarterly report has become the industry's most closely-watched loss ledger. Hacken's Q1 2026 numbers are blunt: $482.6 million stolen across 44 incidents, with phishing and social engineering accounting for $306 million, or 63% of the damage. Smart contract exploits, the category that defined 2022's DeFi summer of hacks, contributed only $86.2 million.

The numbers describe a structural shift the industry has been slow to absorb. Attackers are no longer racing to out-engineer Solidity developers. They are racing to out-engineer humans. And the infrastructure we built to defend against the first kind of attack — audits, bug bounties, formal verification — does almost nothing to stop the second.

Hacken Q1 2026: $482M Stolen and the Quarter That Broke Crypto's Audit-First Religion

· 12 min read
Dora Noda
Software Engineer

One person lost $282 million in a single phone call. No smart contract was exploited. No line of Solidity was touched. A fake IT support representative talked a crypto holder through a hardware wallet "recovery" flow on January 10, 2026, and walked away with more Bitcoin and Litecoin than most DeFi protocols hold in total value locked. That single incident — bigger than Drift, bigger than Kelp DAO on its own — accounts for more than half of every dollar Web3 lost in the first quarter of 2026.

Hacken's Q1 2026 Blockchain Security & Compliance Report puts the full quarter at $482.6 million in stolen funds across 44 incidents. Phishing and social engineering alone dragged away $306 million — 63.4% of the quarterly damage. Smart contract exploits contributed just $86.2 million. Access control failures — compromised keys, cloud credentials, multisig takeovers — added another $71.9 million. The math is blunt: for every dollar stolen from buggy code last quarter, attackers extracted roughly three and a half through the people, processes, and credentials that sit around the code.

For an industry that has spent five years treating "audited" as a synonym for "safe," the Q1 numbers are an intervention. The attack surface has moved. The spending hasn't.

$606M in 18 Days: Why Upgrade-Introduced Bugs Are DeFi's New Top Attack Vector

· 12 min read
Dora Noda
Software Engineer

In just 18 days this April, attackers drained $606 million from DeFi. That single stretch erased Q1 2026's losses 3.7 times over and made the month the worst since the February 2025 Bybit heist. Two protocols — Drift on Solana and Kelp DAO on Ethereum — accounted for 95 percent of the damage. Both had been audited. Both passed static analysis. Both shipped routine upgrades that quietly invalidated the assumptions their auditors had verified.

This is the new face of DeFi risk. The catastrophic exploits of 2026 are no longer about reentrancy bugs or integer overflows that fuzzers can spot in CI. They are about upgrade-introduced vulnerabilities: subtle changes to bridge configurations, oracle sources, admin roles, or messaging defaults that turn previously safe code into an open door — without any single line of Solidity looking obviously wrong.

If you build, custody, or simply hold assets in DeFi, the takeaway from April 2026 is uncomfortable: a clean audit report dated three months ago is no longer evidence that a protocol is safe today.

The April Pattern: Configuration, Not Code

To understand why "upgrade-introduced" deserves its own category, look at how the two largest exploits actually unfolded.

Drift Protocol — $285 million, April 1, 2026. Solana's largest perp DEX lost more than half its TVL after attackers spent six months running a social-engineering campaign against the team. Once trust was established, they used Solana's "durable nonces" feature — a UX convenience designed to let users pre-sign transactions for later submission — to trick Drift Security Council members into authorizing what they thought were routine operational signatures. Those signatures eventually handed admin control to the attackers, who whitelisted a fake collateral token (CVT), deposited 500 million units of it, and withdrew $285 million in real USDC, SOL, and ETH. The Solana feature was working as designed. Drift's contracts were doing what their admins instructed. The attack lived entirely in the gap between what the multisig signers thought they were approving and what they actually were.

Kelp DAO — $292 million, April 18, 2026. Attackers attributed by LayerZero to North Korea's Lazarus Group compromised two RPC nodes underpinning Kelp's cross-chain rsETH bridge, swapped the binaries running on them, and used a DDoS to force a verifier failover. The malicious nodes then told LayerZero's verifier that a fraudulent transaction had occurred. The exploit only worked because Kelp ran a 1-of-1 verifier configuration — meaning a single LayerZero-operated DVN had unilateral authority to confirm cross-chain messages. According to LayerZero, that 1-of-1 setup is the default in its quickstart guide and is currently used by roughly 40 percent of protocols on the network. In 46 minutes, an attacker drained 116,500 rsETH — about 18 percent of the entire circulating supply — and stranded wrapped collateral across 20 chains. Aave, which lists rsETH, was forced into a liquidity crisis as depositors raced for the exit.

Neither attack required a smart-contract bug. Both required understanding how a configuration — multisig signing flows, default DVN counts, RPC redundancy — had been silently elevated from "operational detail" to "load-bearing security assumption."

Why Static Audits Miss This Class of Bug

The traditional DeFi audit is optimized for the wrong threat model. Firms like Certik, OpenZeppelin, Trail of Bits, and Halborn excel at line-by-line code review and at running invariant tests against a frozen contract version. That catches reentrancy, access-control mistakes, integer overflows, and OWASP-style failures.

But the upgrade-introduced bug class has three properties that defeat that workflow:

  1. It lives in composed runtime behavior, not source code. A bridge's safety depends on its messaging layer's verifier configuration, the DVN set, the RPC redundancy of those DVNs, and the slashing exposure of those operators. None of that is in the Solidity an auditor reads.

  2. It is introduced by changes, not by initial deployment. Kelp's bridge presumably looked fine when LayerZero v2 was first integrated. The DVN count became dangerous only as TVL grew large enough to be worth attacking and as Lazarus invested in compromising RPC infrastructure.

  3. It requires behavioral differential testing — answering "was invariant X preserved under the new code path?" — which none of the major audit firms productize as a scheduled, post-upgrade service. You get a one-time audit at version 1.0, and a separate one-time audit at version 1.1, but no continuous statement that upgrading from 1.0 to 1.1 doesn't break properties that 1.0 relied on.

The Q1 2026 statistics put a number on the gap. DeFi recorded $165.5 million in losses across 34 incidents in the entire quarter. April alone produced $606 million in 12 incidents. The deployment side scaled — over $40 billion in new TVL was added in Q1 — while audit capacity, incident response, and post-deployment validation stayed roughly flat. Something had to give.

Three Forces Making 2026 the Year This Bites at Scale

1. Upgrade cadence has accelerated at every layer

Every L1 and L2 is iterating faster. Ethereum's Pectra upgrade is in active rollout, Fusaka and Glamsterdam are in design, and Solana, Sui, and Aptos all ship execution-layer changes on multi-week cycles. Each chain-level upgrade can subtly shift gas semantics, signature schemes, or transaction ordering in ways that ripple into application-layer assumptions. Drift's exploit is a clean example — a Solana feature (durable nonces) intended for UX convenience became the carrier for an admin takeover.

2. Restaking compounds the upgrade surface area

The restaking stack — EigenLayer (still over 80 percent of the market), Symbiotic, Karak, Babylon, Solayer — adds a third dimension to the problem. A single LRT like rsETH sits atop EigenLayer, which sits atop native ETH staking. Each layer ships its own upgrades on its own schedule. A change to EigenLayer's slashing semantics has implicit consequences for every operator and every LRT consuming that operator's validation. When Kelp's bridge was drained, the contagion immediately threatened EigenLayer's TVL, because the same depositors had three-layer rehypothecation exposure they had never been forced to model. EigenCloud's roadmap, with its imminent EigenDA, EigenCompute, and EigenVerify expansions, will only widen that surface.

3. AI-driven DeFi activity moves faster than human review

Agent stacks like XION, Brahma Console, and Giza now interact with upgraded contracts at machine speed. Where a human treasurer might wait days after a contract upgrade before re-engaging, an agent backtests it, integrates it, and routes capital through it within hours. Any upgrade that quietly breaks an invariant gets stress-tested by adversarial flow before a human auditor can re-review it.

The Defensive Architecture Beginning to Emerge

The encouraging news is that the security-research community has not been idle. April 2026's losses have catalyzed concrete proposals across four fronts.

Continuous formal verification. Certora's long-running collaboration with Aave — funded as a continuous-verification grant rather than a one-shot engagement — is now a template. The Certora Prover automatically re-runs invariant proofs every time a contract changes, surfacing breakages before merge. Halmos and HEVM offer alternative open-source paths to the same goal. When formal verification recently caught a vulnerability in an integration with Ethereum's Electra upgrade that traditional audits had missed, it was not an outlier; it was a preview.

Upgrade-diff audit services. Spearbit, Zellic, and Cantina have started piloting paid services that audit the diff between two contract versions, not the new version in isolation. The model treats each upgrade as a new attestation and explicitly examines whether prior invariants are preserved. The Ethereum Foundation's $1M audit subsidy program, launched April 14, 2026, with a partner roster including Certora, Cyfrin, Dedaub, Hacken, Immunefi, Quantstamp, Sherlock, Spearbit, Zellic, and Zokyo, is partly aimed at expanding capacity for exactly this kind of work.

Chaos engineering and runtime monitoring. OpenZeppelin Defender and emerging tools are wiring forked-mainnet simulations into CI pipelines, allowing protocols to replay adversarial scenarios against every proposed upgrade. The discipline is borrowed directly from Web2 SRE practice — and is overdue in DeFi.

Time-locked upgrade escrows. The Compound Timelock v3 pattern, where every governance-approved upgrade sits in a public queue for a fixed delay before execution, gives the community time to spot issues that internal review missed. It does not prevent upgrade-introduced bugs, but it does buy time for them to be discovered before exploitation.

The TradFi Comparison: Continuous Audit Is the Norm Outside DeFi

Traditional finance solved the analogous problem decades ago. SOC 2 Type II, the standard most institutional service providers are held to, is not a one-time attestation; it is a six-to-twelve-month continuous-audit window. Basel III's counterparty-risk framework requires banks to update their capital models as exposures change, not annually. A custody bank that upgraded a settlement system would not be allowed to operate on a "we audited v1; v2 was just a small change" basis.

DeFi's prevailing culture — "audit once, deploy forever, re-audit only on major rewrites" — is the practice TradFi explicitly rejected after the 2008 crisis. At the current loss rate, the industry is on track for $2 billion or more in annual upgrade-exploit losses. That is large enough to attract regulators who already view DeFi auditing standards as substandard, and it is large enough to make continuous validation a precondition for institutional capital.

What This Means for Builders, Depositors, and Infrastructure

For protocol teams, the operational mandate is straightforward, even if it is not cheap: every upgrade must be treated as a new release that re-derives, not inherits, its security guarantees. That means scheduled re-audits on a diff basis, formal-verification specs that travel with every governance proposal, and meaningful timelocks before execution. It means publishing — Aave-style — a quantified cascade-risk framework that names which protocols you depend on and what your exposure looks like when one of them fails.

For depositors, the lesson is that "this protocol was audited" is no longer a useful signal on its own. The right question is "when was the last continuous-verification run, against what invariants, and on what version of the deployed code?" Protocols that cannot answer that should be priced accordingly.

For infrastructure providers — RPC operators, indexers, custodians — the Kelp incident is a direct warning. The compromise lived in two RPC nodes whose binaries were silently swapped. Anyone running infrastructure that participates in cross-chain verification (DVNs, oracle nodes, sequencers) is now part of the security model whether they signed up to be or not. Reproducible builds, attested binaries, multi-operator quorums above 1-of-1 defaults, and signed-binary verification at startup are no longer optional.

Chain-level upgrades — Pectra and Fusaka on Ethereum, parallel-execution rollouts on Solana and Aptos, Glamsterdam's throughput targets — will keep widening the surface. The protocols and infrastructure operators who survive 2026 will be the ones who adopted continuous validation early enough that their next routine upgrade is also their next provable security checkpoint.

BlockEden.xyz operates production RPC, indexer, and node infrastructure across Sui, Aptos, Ethereum, Solana, and a dozen other chains. We treat every protocol upgrade — at the chain layer or the application layer — as a new security event, not a maintenance task. Explore our enterprise infrastructure to build on a foundation designed to survive the upgrade cadence ahead.

Sources

Bitcoin's Covenant Renaissance: How OP_CTV, LNHANCE, OP_CAT, and BitVM2 Could Finally Bring Smart Contracts to Bitcoin L1

· 13 min read
Dora Noda
Software Engineer

For fifteen years, Bitcoin's scripting language has been deliberately, aggressively boring. No loops. No recursion. No state. A small stack, a handful of opcodes, and a culture that treats every proposed expansion like a potential civil war. That conservatism is the reason Bitcoin has never been successfully exploited at the consensus layer — and the reason developers who wanted to build anything beyond "send coins from A to B" eventually gave up and moved to Ethereum.

That calculus is shifting in 2026. OP_CHECKTEMPLATEVERIFY has concrete activation parameters on the table for the first time since BIP-119 was drafted. OP_CAT has an official BIP number. LNHANCE is being actively discussed as a Lightning-focused alternative. And BitVM2 — which doesn't require any soft fork at all — is already live in production, powering Citrea's mainnet bridge that launched in January. After years of "covenants are coming soon," Bitcoin is finally in the phase where multiple credible proposals are running in parallel, each solving a different slice of the problem.

ERC-8220 and the Immutable Seal: Ethereum's Missing Layer for On-Chain AI Governance

· 11 min read
Dora Noda
Software Engineer

Ninety-two percent of security professionals are worried about AI agents inside their organizations. Thirty-seven percent of those same organizations have a formal AI policy. That 55-point gap is the opening line of every 2026 board deck — and it is the exact problem ERC-8220 is trying to close on-chain.

On April 7, 2026, a draft filing landed in the Ethereum Magicians forum proposing ERC-8220: Standard Interface for On-Chain AI Governance With Immutable Seal Pattern. It is the fourth brick in what a small group of core developers has started calling the agentic Ethereum stack: identity (ERC-8004), commerce (ERC-8183), execution (ERC-8211), and now governance. If it reaches Final before the Glamsterdam fork, it may do for autonomous agents what ERC-20 did for fungible tokens — turn a messy design space into a composable primitive.

The proposal's load-bearing idea is the "immutable seal." Everything else in ERC-8220 flows from it. Get the seal right and the other three standards suddenly have a foundation to stand on. Get it wrong and the entire agentic stack inherits a silent failure mode.

Resolv Hack: How One AWS Key Minted $25M and Broke DeFi Again

· 10 min read
Dora Noda
Software Engineer

On March 22, 2026, an attacker walked into Resolv Labs with $100,000 in USDC and walked out with $25 million in ETH. The smart contracts never bugged out. The oracle never lied. The delta-neutral hedging strategy behaved exactly as designed. Instead, a single AWS Key Management Service credential — one signing key that lived outside the blockchain — gave an intruder permission to mint 80 million unbacked USR tokens against a $100K deposit. Seventeen minutes later, USR had fallen from $1.00 to $0.025, a 97.5% collapse, and lending protocols across Ethereum were absorbing the shock.

The Resolv incident isn't remarkable because it was clever. It's remarkable because it wasn't. A missing max-mint check, a single point of failure in cloud key management, and oracles that priced a depegged stablecoin at $1 — DeFi has seen each of these failures before. What the hack reveals is uncomfortable: the attack surface of modern stablecoins has quietly migrated from Solidity to AWS consoles, and the industry's security models haven't caught up.

DeFi's Shadow Contagion: When a $25M Hack Triggers $500M in Cascading Losses

· 10 min read
Dora Noda
Software Engineer

On March 22, 2026, an attacker deposited about $100,000 of USDC into a stablecoin protocol most of crypto had never heard of. Seventeen minutes later, they walked away with roughly $25 million in ETH. By the end of the week, the actual damage wasn't $25 million. It was more than $500 million — scattered across lending markets that had never been touched by the exploit itself.

Welcome to DeFi's shadow contagion problem: the systemic risk nobody is pricing, because nobody has a map of the pipes.

Intent-Based Wallets: The Endgame of Account Abstraction

· 12 min read
Dora Noda
Software Engineer

For fifteen years, using crypto has meant one deeply strange ritual: opening a wallet, scrutinizing a hex-encoded transaction, manually funding an account with the right gas token, and signing with a key you are personally responsible for never losing. By 2026, that ritual is on the way out — and the wallets leading the charge are not asking users to sign transactions at all. They are asking users what outcome they want.

That shift, from transaction-based wallets to intent-based wallets, is the long-promised endgame of account abstraction. It is being assembled right now out of three apparently unrelated pieces: ERC-4337 smart accounts, EIP-7702 EOA programmability, and a $10B+ wallet-as-a-service market in which Coinbase, Privy (now part of Stripe), Dynamic (acquired by Fireblocks), Safe, and Biconomy are racing to build the default consumer surface for Web3. Put them together and you get a wallet that finally behaves like Apple Pay: you express a desire, someone else figures out the plumbing, and the blockchain disappears.

The Final Form: Users Specify Outcomes, Not Transactions

The mental model for a 2020-era crypto wallet was a transaction factory. You selected a chain, chose a gas token, set slippage, reviewed calldata, and signed. Every UX paper cut — wrong network, insufficient ETH for gas, a signature for an approval plus a second signature for the swap — came from the fact that the user was the one operating the low-level machine.

Intent-based architectures invert that model. As Anoma's research on intent-centric topologies frames it, an intent is a partial state change expressing a preference, signed by the user, that a solver network competes to fulfill. CoW Protocol has run this playbook for years as a batch-auction DEX where users sign "sell X for at least Y" and solvers do the routing. Flashbots' SUAVE takes the same idea down into block building. Cross-chain intent protocols are actively replacing bridges, turning "bridge from Arbitrum to Base" into "have these tokens on Base in under a minute."

The critical point for wallets is this: once an account is programmable enough to accept conditional, multi-step instructions and hand them off to a solver, the UI no longer has to look like Etherscan. It can look like a chat box, a Shopify checkout, or a one-tap "Buy PENGU" button inside a consumer app. The wallet becomes the place where intents get authenticated; something else does the executing.

ERC-4337 Built the Execution Pipes

The first enabling piece is ERC-4337, which went live on Ethereum mainnet on March 1, 2023, and quietly became the execution substrate for most of today's smart wallets. Instead of sending a transaction from an externally owned account, a user signs a UserOperation — a richer object that specifies validation rules, an optional paymaster, and the calls to execute. Bundlers package these into real transactions and send them to a canonical EntryPoint contract. Alchemy's overview of account abstraction walks through this pipeline in detail.

Three capabilities fall out of this design, and together they make intent-based UX actually shippable:

  • Gas abstraction via paymasters. A paymaster contract can agree to pay gas on the user's behalf, sponsored by the application or swapped from any ERC-20 the user holds. The experience is a user with zero ETH transacting immediately after account creation — the pattern that Nadcab's 2026 gas abstraction guide projects will become an invisible default by 2027.
  • Session keys. Rather than reauthorizing every action, a user can grant a scoped, time-limited key — "this dApp may spend up to 100 USDC on trades on Base for the next hour." This is the primitive that makes on-chain games, AI agents, and high-frequency DeFi usable without a signature popup every 30 seconds.
  • Modular validation. Because validation is expressed in contract code, not hard-coded by the protocol, wallets can swap in passkeys, multisig logic, social recovery, or fraud checks without changing the underlying account.

ERC-4337 by itself, however, had a structural problem: smart accounts are separate contracts from the ordinary EOAs most users already had. Migrating 200M+ existing addresses into brand-new accounts was never going to happen cleanly. That is the gap EIP-7702 closed.

EIP-7702 Upgraded Everyone's Wallet Overnight

Ethereum's Pectra upgrade launched on May 7, 2025, and introduced EIP-7702 — a deceptively simple change that lets an ordinary EOA temporarily delegate its code to a smart contract. The private key still controls the account, but while the delegation is active, the EOA behaves like a smart wallet: it can batch calls, use paymasters, whitelist session keys, and plug into ERC-4337 infrastructure. Turnkey's deep dive on the 4337-to-7702 journey captures the key insight: the two standards are complementary, not competing.

The effect on adoption is dramatic. MetaMask, Ledger, Ambire, and Trust Wallet have shipped EIP-7702 support, and Ledger has rolled it out across Flex, Stax, Nano Gen5, Nano X, and Nano S Plus hardware. BuildBear's ERC-4337 vs EIP-7702 comparison notes that most major wallet providers are expected to follow through 2025 and into 2026, which is exactly what the on-chain data is now showing.

In practical terms, 7702 means users do not have to know they are getting a smart wallet. Their existing address keeps working; it just starts doing more. That is the quiet precondition for a mass-market intent-based UX: you cannot ask hundreds of millions of users to migrate, so you upgrade the account they already have.

The $10B+ Wallet-as-a-Service Battle

If ERC-4337 and EIP-7702 are the protocol layer, the battle for the product layer is being fought in wallet-as-a-service. This is where consumer-grade onboarding, passkeys, embedded UIs, and intent routing get packaged into an SDK that any app can drop in.

The leaders each come from a different angle:

  • Coinbase Smart Wallet is the reference consumer implementation. Coinbase's announcement and Base's rollout plan describe a wallet with passkey-based authentication, gasless transactions by default, and cross-chain deployment — 8 networks at launch and the same contract address across 248 chains via the Safe Singleton Factory. It is effectively trying to become the "Sign in with Apple" of Web3.
  • Privy, acquired by Stripe in June 2025, is now fused with Bridge to unify crypto and fiat payments, pushing embedded wallets deep into mainstream fintech flows. Openfort's Privy alternatives guide tracks how this acquisition reshaped the consumer-crypto landscape.
  • Dynamic, acquired by Fireblocks, is focusing on developer experience and multi-chain adapters, positioning embedded wallets as an enterprise building block.
  • Safe and Biconomy are competing on the modular-account side, particularly around ERC-7579 — a minimal standard for modular smart accounts co-developed by Rhinestone, Biconomy, ZeroDev, and OKX that lets validators, executors, hooks, and fallback handlers plug into any compliant account.
  • Aggregators such as WAGMI, Web3Modal, RainbowKit, and Reown have already integrated smart wallets at the connector layer, meaning most new dApps are intent-capable by default.

The strategic prize is the identity and intent layer for Web3. Whoever owns the wallet owns the funnel for every transaction, payment, and agent action a user initiates. Openfort's top 10 embedded wallets report and the wave of Stripe/Fireblocks M&A make it clear that incumbents now treat this as strategically important — and finite.

The Four Primitives That Make the Intent Wallet Real

Strip away the marketing and there are four concrete primitives behind "wallets that hide the blockchain."

  1. Native passkeys (EIP-7212). A precompile for secp256r1 signature verification lets wallets authenticate with the same WebAuthn passkeys iPhones, Android devices, and YubiKeys already use. That removes seed phrases as the default recovery model and replaces them with device-secure, phishing-resistant credentials users already trust.
  2. Session keys (commonly structured as ERC-7579 validator modules). Scoped, revocable permissions underwrite one-tap gameplay, recurring payments, and agent autonomy without turning the signature popup into spam.
  3. Gas abstraction (ERC-4337 paymasters). Apps sponsor gas, users pay fees in the stablecoin they already hold, and "I need to buy ETH first" stops being a gating step.
  4. Batched execution (ERC-7821). A single user action can contain an approve + swap + bridge + stake sequence that either all happens or none of it does, eliminating the half-completed multi-step disasters that define crypto UX today.

Combine these four with a solver network and you have the ingredients for an actual intent-based wallet: the user says "swap $500 of USDC for ETH on whatever chain is cheapest," and the wallet handles bridging, gas, approval, and execution under one authorization.

Why This Is Also a Security Story

Intent architectures are not just a UX upgrade. They are also a security pattern, which matters more than usual given the $25M Resolv hack reporting from March 2026 that put intent-layer safety on investors' radar.

Two shifts stand out. First, because intents are expressive declarations of desired end states, wallets and solvers can simulate and reason about them before execution — rejecting anything whose outcome would violate a policy, rather than relying on users to spot malicious calldata. Second, smart accounts let wallets layer defense-in-depth: spending limits, address allow-lists, transfer delays on large outflows, and automatic pauses on anomalous activity can all be modules on the account itself, not optional settings buried in a UI.

The flip side is new risk surface. Solver networks can collude, paymasters can front-run, and a mis-scoped session key can drain an account silently. Intent wallets do not eliminate risk; they move it from "did the user read the calldata?" to "did the wallet's modules and solvers behave correctly?" That is a far better question to be auditing in 2026.

What Builders Should Watch in the Next 12 Months

Three inflection points are worth tracking:

  • EIP-7702 saturation. As more wallets turn on delegation and more dApps start assuming smart-wallet capabilities, the design space for EOA-only UX collapses. Apps that still require users to manually fund gas, approve separately, and sign bridges will feel obsolete.
  • ERC-7579 module ecosystems. Expect a real marketplace of audited validators, session-key modules, recovery policies, and compliance hooks that wallets can compose the way mobile apps compose SDKs. Thirdweb, OpenZeppelin, and Rhinestone are already building toward this.
  • Intent settlement standards. Cross-chain intents are the next battleground, and whoever standardizes settlement (ERC-7683 and its successors) will influence how liquidity and MEV get captured across L2s.

The underlying infrastructure — low-latency RPCs, bundlers, paymasters, indexers — has to keep pace. Every intent that a wallet accepts becomes several chain operations behind the scenes, which means the providers that serve these wallets see traffic scale non-linearly with user counts.

BlockEden.xyz operates high-availability RPC and indexing infrastructure across Ethereum, Base, Arbitrum, Sui, Aptos, and other networks that intent-based wallets settle on. If you are building a smart-wallet SDK, paymaster, solver, or embedded-wallet experience, explore our API marketplace to run on infrastructure designed for the multi-chain, intent-driven future.

Sources

Movement Labs M2: EVM + Move Hybrid Lets Solidity Inherit Resource-Type Safety

· 9 min read
Dora Noda
Software Engineer

Smart contract exploits drained more than $3.1 billion from DeFi in the first half of 2025 alone — already eclipsing 2024's full-year toll of $2.85 billion. Reentrancy attacks accounted for $420 million of those Q3 losses. Integer overflow bugs continue showing up in audits. The Penpie protocol lost $27 million to a single reentrancy in 2024. Every one of these vulnerabilities is a direct consequence of how the Ethereum Virtual Machine handles assets and function dispatch — and every Solidity developer knows it.

Movement Labs is betting that developers don't have to choose between Ethereum's $50 billion liquidity moat and Move's compile-time safety guarantees. Its M2 chain — the first Move VM-based Layer 2 for Ethereum, settled on Celestia and now plugged into Polygon's AggLayer — claims a way to deploy unmodified Solidity bytecode into a Move execution environment. If it works, it's the most ambitious "safety upgrade" pitch in Ethereum's L2 era. If it doesn't, it joins a long list of hybrid VMs that appealed to neither constituency.