Back to Blog
Tag

DeFi

13 articles

Account Abstraction (ERC-4337) Security: The New Attack Surface Nobody's Auditing

ERC-4337 smart wallets now control billions in on-chain value, but most audits still treat them like regular contracts. Here are the bundler, paymaster, and session-key bugs we keep finding — and how to test for them before shipping.

Apr 13, 20267 min read

Cross-Chain Message Replay: The 2026 Bridge Vulnerability Playbook

Bridge exploits haven't gone away — they've just gotten more subtle. Signature replay, nonce collision, and chain-id confusion are still draining millions in 2026. Here's what modern audits need to check.

Apr 10, 20266 min read

How to Audit a Smart Contract Before Launch

A step-by-step guide from internal testing through external audit to post-launch monitoring. Don't deploy without this checklist.

Mar 5, 20268 min read

AI vs Human Smart Contract Audit: A Honest Comparison

AI audits are faster and cheaper. Human audits catch business logic flaws. Here's exactly where each excels, where each fails, and why the hybrid approach wins.

Mar 1, 20267 min read

Free Smart Contract Audit Tools in 2026: The Complete Guide

Every free and open-source tool you can use to audit your smart contracts — from static analysis to fuzzing to formal verification. What each catches and where they fall short.

Feb 28, 202610 min read

Anatomy of a Flash Loan Attack: Step-by-Step Breakdown

A detailed technical walkthrough of how flash loan attacks work, real-world examples, and how to protect your DeFi protocol from this unique attack vector.

Feb 22, 20265 min read

DeFi Liquidation Mechanics: Security Implications

Liquidation is the safety valve of DeFi lending. When it fails, protocols become insolvent. Here's how liquidation works, what goes wrong, and how to audit it.

Feb 21, 20265 min read

The Hidden Risks of DeFi Composability

DeFi's greatest strength — permissionless composability — is also its greatest vulnerability. Here's how protocol interactions create systemic risk.

Feb 19, 20266 min read

Common DeFi Vulnerabilities We See in Every Audit

The recurring security issues that appear in almost every DeFi protocol we audit — from price oracle manipulation to flash loan attacks.

Feb 12, 20265 min read

MEV and Front-Running: The Hidden Tax on DeFi Users

Maximal Extractable Value costs DeFi users billions annually. Here's how MEV works, why it matters for protocol security, and how to protect your users.

Feb 9, 20265 min read

DAO Governance Security: Preventing Hostile Takeovers

On-chain governance is a powerful decentralization tool — and a prime target for attackers. Here's how governance attacks work and how to prevent them.

Feb 8, 20265 min read

How We Audited a $50M DeFi Protocol in 10 Days

A behind-the-scenes look at a real RedVolt engagement — how our AI + human approach delivered a comprehensive DeFi audit in record time.

Feb 6, 20266 min read

Reentrancy Attacks Explained: From The DAO to 2026

Reentrancy caused the first major DeFi hack in 2016. A decade later, it's still happening — in new and surprising forms. Here's the full story.

Jan 17, 20265 min read