Back to Blog
Tag

Vulnerabilities

7 articles

DeFi Liquidation Mechanics: Security Implications

Liquidation is the safety valve of DeFi lending. When it fails, protocols become insolvent. Here's how liquidation works, what goes wrong, and how to audit it.

Feb 21, 20265 min read

Common DeFi Vulnerabilities We See in Every Audit

The recurring security issues that appear in almost every DeFi protocol we audit — from price oracle manipulation to flash loan attacks.

Feb 12, 20265 min read

File Upload Vulnerabilities: From Shell Upload to RCE

File upload features are one of the most dangerous attack surfaces in web applications. Here's how attackers abuse them — and how to build uploads that are actually safe.

Jan 26, 20265 min read

Reentrancy Attacks Explained: From The DAO to 2026

Reentrancy caused the first major DeFi hack in 2016. A decade later, it's still happening — in new and surprising forms. Here's the full story.

Jan 17, 20265 min read

Authentication Bypass Techniques Every Developer Should Know

Authentication is the front door to your application. Here are the bypass techniques attackers use — and the mistakes that make them possible.

Jan 14, 20266 min read

XSS in 2026: Why Cross-Site Scripting Still Won't Die

Cross-site scripting has been on the OWASP Top 10 for over two decades. Here's why it persists, how it's evolving, and what actually stops it.

Jan 10, 20265 min read

SQL Injection Is Not Dead: Modern SQLi Techniques

SQL injection was supposed to be a solved problem. ORMs, parameterized queries, WAFs — yet SQLi still appears in our audits. Here's how it's evolving.

Jan 6, 20265 min read