Resources

People often ask me "How did you learn how to hack?" The answer: by reading. This page is a collection of the blog posts and other articles that I have accumulated over the years of my journey. Enjoy!

Retrospecting Unhealthy Order Allowance Vulnerability in Perpetual Protocol- 1284

ChainLightPosted 2 Years Ago

LayerZero's Cross-Chain Messaging Vulnerability- 1283

HeussPosted 2 Years Ago

Optimism Censorship Bug Disclosure- 1282

iosiroPosted 2 Years Ago

Oh-Auth - Abusing OAuth to take over millions of accounts- 1281

Aviad Carmel - Salt LabsPosted 2 Years Ago

A short note on AWS KEY ID- 1280

Tal Be'eryPosted 2 Years Ago

Helping Secure BNB Chain Through Responsible Disclosure- 1279

Felix WilhelmPosted 2 Years Ago

Rate manipulation in Balancer Boosted Pools — technical postmortem- 1278

JuaniPosted 2 Years Ago

Understanding the Astrid Finance Exploit - 1277

Neptune MutualPosted 2 Years Ago

Aztec Connect Claim Proof Bug- 1276

AztecPosted 2 Years Ago

Response Header Injection in SAP HTTP Content Server- 1275

Hero LabPosted 2 Years Ago