Forem

Blockchain

A decentralized, distributed, and oftentimes public, digital ledger consisting of records called blocks that are used to record transactions across many computers so that any involved block cannot be altered retroactively, without the alteration of all subsequent blocks.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
MoltsPay 1.3.0: Now with Tempo Testnet & MPP Protocol Support

MoltsPay 1.3.0: Now with Tempo Testnet & MPP Protocol Support

Comments
2 min read
When AI Agents Meet Poisoned Oracles: How Autonomous DeFi Bots Turn Price Manipulation Into Protocol-Ending Events

When AI Agents Meet Poisoned Oracles: How Autonomous DeFi Bots Turn Price Manipulation Into Protocol-Ending Events

Comments
7 min read
UltrafastSecp256k1 v3.3.0

UltrafastSecp256k1 v3.3.0

1
Comments
2 min read
The ZK Proof Verification Minefield: Frozen Heart, Input Aliasing, and Proof Malleability

The ZK Proof Verification Minefield: Frozen Heart, Input Aliasing, and Proof Malleability

Comments
6 min read
From Zero to GenLayer: Hands-On Tutorial to Build an Intelligent Contract dApp
Cover image for From Zero to GenLayer: Hands-On Tutorial to Build an Intelligent Contract dApp

From Zero to GenLayer: Hands-On Tutorial to Build an Intelligent Contract dApp

1
Comments
9 min read
Opening the Playbook: Why We're Open-Sourcing Casper's Core DeFi Infrastructure
Cover image for Opening the Playbook: Why We're Open-Sourcing Casper's Core DeFi Infrastructure

Opening the Playbook: Why We're Open-Sourcing Casper's Core DeFi Infrastructure

3
Comments
9 min read
The Windsurf IDE Trojan: How a Fake Extension Turns the Solana Blockchain Into a Bulletproof Credential Exfiltration Pipeline

The Windsurf IDE Trojan: How a Fake Extension Turns the Solana Blockchain Into a Bulletproof Credential Exfiltration Pipeline

Comments
6 min read
The Neutrl DNS Hijack: 7 Domain Defense Layers Every DeFi Protocol Must Deploy Today

The Neutrl DNS Hijack: 7 Domain Defense Layers Every DeFi Protocol Must Deploy Today

Comments
7 min read
Solana Memo Program as Malware C2: Inside the GlassWorm Supply Chain Attack That Weaponized the Blockchain

Solana Memo Program as Malware C2: Inside the GlassWorm Supply Chain Attack That Weaponized the Blockchain

1
Comments
5 min read
ERC-20 vs ERC-721 vs ERC-1155: When to Use Each Token Standard

ERC-20 vs ERC-721 vs ERC-1155: When to Use Each Token Standard

1
Comments
4 min read
OWASP Smart Contract Top 10: 2026 — The Practical Defense Guide Nobody Wrote Yet

OWASP Smart Contract Top 10: 2026 — The Practical Defense Guide Nobody Wrote Yet

Comments
4 min read
Hot Wallet Security Architecture: What Every Crypto Platform Must Learn From Bitrefill's Lazarus Group Breach

Hot Wallet Security Architecture: What Every Crypto Platform Must Learn From Bitrefill's Lazarus Group Breach

Comments
7 min read
From Web2 to Web3: A Practical Guide to Building a Gasless Crypto Payment Flow (With Starknet & StarkZap)
Cover image for From Web2 to Web3: A Practical Guide to Building a Gasless Crypto Payment Flow (With Starknet & StarkZap)

From Web2 to Web3: A Practical Guide to Building a Gasless Crypto Payment Flow (With Starknet & StarkZap)

Comments
5 min read
GlassWorm's Solana C2: How a Supply-Chain Monster Turned the Blockchain Into a Dead Drop

GlassWorm's Solana C2: How a Supply-Chain Monster Turned the Blockchain Into a Dead Drop

1
Comments
6 min read
The Solana CPI Security Playbook: 7 Cross-Program Invocation Patterns That Prevent Nine-Figure Exploits

The Solana CPI Security Playbook: 7 Cross-Program Invocation Patterns That Prevent Nine-Figure Exploits

Comments
5 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.