<?xml version="1.0" encoding="UTF-8"?><rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>security | Web3ReadList</title><description>@Wongssh web3 reading list. A reading list for solidity, web3 and Dapp programmers. We use Chinese and English language.</description><link>https://www.web3list.xyz</link><item><link>https://www.web3list.xyz/posts/2158</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2158</guid><pubDate>Mon, 30 Mar 2026 16:37:21 GMT</pubDate><content:encoded>&lt;a href=&quot;https://hexens.io/research/polygon-bridge-forging-transaction-proofs&quot; target=&quot;_blank&quot;&gt;https://hexens.io/research/polygon-bridge-forging-transaction-proofs&lt;/a&gt;&lt;br /&gt;一个基于 memory corruption 的复杂 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 漏洞&lt;a href=&quot;https://medium.com/coinmonks/how-a-memory-corruption-bug-almost-drained-800m-from-the-polygon-bridge-6aad2cc0baa6&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Medium&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;How a Memory Corruption Bug Almost Drained $800M From the Polygon Bridge&quot; src=&quot;/static/https://cdn4.telesco.pe/file/cLoz_U94ty927a_ivo78lAfvpA94t3tKaKAHnQn36Glo-DdcUTil2Z1E3QnVCweMMqZHSN1spdySBVCdzt7FPi0OyRHetrX1ZCw75QRq9XrwAkuENKpmaDlSthCPsjkAbfX9hxORGnwCia33Cf9XgAVEk8Qaw_Ey2TLbQZcsBdVJsoq4_8b6USCiPiTfk0HlLVFRM0KE2RsL4uNfbXAfSxGlxhNWl0V_XVB8u6PNqGmJeVjGNFJa3fXmxQ4mnkj5DxtW3aNe3Fojd_0h7vcurE6AE_3jCpoE365dOdUo_jAx6bQwuPw6m6_A9ox7pMCjVMHgv8UTZTc9fDzdVVwCAg.jpg&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;How a Memory Corruption Bug Almost Drained $800M From the Polygon Bridge&lt;/div&gt;
  &lt;div&gt;Two bugs, one exploit chain: forging arbitrary withdrawal proofs on the Polygon Plasma bridge, ~10 min read.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2157</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2157</guid><pubDate>Sat, 28 Mar 2026 10:58:57 GMT</pubDate><content:encoded>&lt;a href=&quot;https://paragraph.com/@0x3b/oracle-bugs&quot; target=&quot;_blank&quot;&gt;https://paragraph.com/@0x3b/oracle-bugs&lt;/a&gt;&lt;br /&gt;一些简单的有关 Oracle 的 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 漏洞&lt;a href=&quot;https://paragraph.com/@0x3b/oracle-bugs&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Pyro | 0x3b&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;5 oracle bugs (from real audits)&quot; src=&quot;/static/https://cdn4.telesco.pe/file/c_xnlGAAii_nCPgCsouZn8bUoG5YNm6U7WdmJ-oCtmZuf6YDmyQ-h21uiXFqGECB8lHuWTOhVsNr809yXeabcrNYzJVMkML0MltofJgE1M1LMSv9qrw_EJXMW1dxKiKT0YI4nUGqD294plPX7xIGuN3pKZA0xsL7g7iALBba0Ppf7BpufBRxNicAJgsdhTL8fJX4RISFOr0yxm9reXVbDoMy74A6LMqdobqQx6nSvjebu5CGcpaLdTL7_W7Lx6CRq2FAZ4PVDBCKxbQ6oLLcw-Q3BCq-ExjuFrIG9xFgmDn0knZSqwrthlHxvgBADJEqlpt8IqINIldoEeUce1G2tQ.jpg&quot; loading=&quot;eager&quot; /&gt;
  &lt;div&gt;5 oracle bugs (from real audits)&lt;/div&gt;
  &lt;div&gt;5 real world oracle mistakes that will wreck your protocol before an attacker even shows up.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2152</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2152</guid><pubDate>Mon, 23 Mar 2026 18:34:42 GMT</pubDate><content:encoded>&lt;a href=&quot;https://x.com/0xprivacypools/status/2036128249525272887&quot; target=&quot;_blank&quot;&gt;https://x.com/0xprivacypools/status/2036128249525272887&lt;/a&gt;&lt;br /&gt;误用 bytesToNumber 而导致随机熵降低导致的 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 漏洞&lt;a href=&quot;https://x.com/0xprivacypools/status/2036128249525272887&quot; target=&quot;_blank&quot;&gt;
  &lt;i&gt;&lt;/i&gt;
  &lt;div&gt;X (formerly Twitter)&lt;/div&gt;
  
  &lt;div&gt;Privacy Pools (@0xprivacypools) on X&lt;/div&gt;
  &lt;div&gt;Privacy Pools SDK Bug Patch and Key Migration&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2148</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2148</guid><pubDate>Thu, 12 Mar 2026 14:15:37 GMT</pubDate><content:encoded>&lt;a href=&quot;https://x.com/z0r0zzz/status/2031755989968642511&quot; target=&quot;_blank&quot;&gt;https://x.com/z0r0zzz/status/2031755989968642511&lt;/a&gt;&lt;br /&gt;实战测试智能合约 AI &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 审计工具&lt;a href=&quot;https://x.com/z0r0zzz/status/2031755989968642511&quot; target=&quot;_blank&quot;&gt;
  &lt;i&gt;&lt;/i&gt;
  &lt;div&gt;X (formerly Twitter)&lt;/div&gt;
  
  &lt;div&gt;ross.wei (@z0r0zzz) on X&lt;/div&gt;
  &lt;div&gt;I ran 21 AI scans on a smart contract&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2146</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2146</guid><pubDate>Wed, 11 Mar 2026 15:46:03 GMT</pubDate><content:encoded>&lt;a href=&quot;https://blog.trailofbits.com/2026/03/11/six-mistakes-in-erc-4337-smart-accounts/&quot; target=&quot;_blank&quot;&gt;https://blog.trailofbits.com/2026/03/11/six-mistakes-in-erc-4337-smart-accounts/&lt;/a&gt;&lt;br /&gt;ERC4337 的常见 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 漏洞&lt;a href=&quot;https://blog.trailofbits.com/2026/03/11/six-mistakes-in-erc-4337-smart-accounts/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;The Trail of Bits Blog&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Six mistakes in ERC-4337 smart accounts&quot; src=&quot;/static/https://cdn4.telesco.pe/file/qsfh4ZMxD056LFSBVtasBuf9X10HZiiHAPhLXmJh1qbomZk6xlV5TlPjHLT_2JIv3eAh4ChG7bcgjTSGv8hgelz3_BJeDZHZv7fP8hf3rZdWC5ABNvAvJEAX0uweLk7iXXcZfRXLPNCOu7extRvl1tkPc3eo-cdz-0XG9KlSq8DZfeOKTjfMS0DWkQ-CwFs-Gn8WSvleeCV59Rp29q_jkzlBnOgR7Q-xIu1qZ-0E-v_4dgSjQWFrPZnApwFoFaEtNT8P1-nRRDXfQKOi741rWNSMl-0GDcpo-1knSc_-qMQMhpt50aE-_S1Oi3FOYxegZVPHMW1h0i0rpknYddtCkQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Six mistakes in ERC-4337 smart accounts&lt;/div&gt;
  &lt;div&gt;After auditing dozens of ERC‑4337 smart accounts, we’ve identified six vulnerability patterns that frequently appear.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2133</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2133</guid><pubDate>Mon, 23 Feb 2026 15:01:37 GMT</pubDate><content:encoded>&lt;a href=&quot;https://paragraph.com/@0x3b/9-common-vault-bugs&quot; target=&quot;_blank&quot;&gt;https://paragraph.com/@0x3b/9-common-vault-bugs&lt;/a&gt;&lt;br /&gt;金库合约可能存在的安全 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 问题&lt;a href=&quot;https://paragraph.com/@0x3b/9-common-vault-bugs&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Pyro | 0x3b&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;The most common vault bugs (from real audits)&quot; src=&quot;/static/https://cdn4.telesco.pe/file/n8S2uUIjIU5hNf7FGd3u8SAbhcRnO_QtQxyDHNtiWO98X-qZG67l45orPMIXBY6ISHa4PBqgsJ_hIHXcZnwDpt5zXx9S-7zXI5ABUoy0CtnckL5U5yPlGwS5b2P2X8BklKNOeX8PaGUtp2OSfW6vunJW6vuucLYgRAKOPaMlWAjrMtIXkb7etpKoAbAGYfCY81cLu4OksnGAUedfDqHr3YdAtHWY9nmAV9hp4oA1nYQHWwop8_kLX-TJq7F6WwJQQybLM5Yw9EgV9rvpcsPYurqjHbUTUJ_OMfqnGLcV7Iw5_gsCMOG_u7_cRD7A9KLDe9l-F_zx_laJf-3S7qhzqw.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;The most common vault bugs (from real audits)&lt;/div&gt;
  &lt;div&gt;Real bugs we keep finding in DeFi vaults: first depositor, bad debt, MEV, lockup gaming, insolvency, broken reward handling, and yield killing routing. If you’re building or integrating vaults, read this before mainnet or you’ll learn these the hard way.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2116</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2116</guid><pubDate>Sat, 17 Jan 2026 04:03:24 GMT</pubDate><content:encoded>&lt;a href=&quot;https://muellerberndt.medium.com/finding-soundness-bugs-in-zk-circuits-ea23387a0e1e&quot; target=&quot;_blank&quot;&gt;https://muellerberndt.medium.com/finding-soundness-bugs-in-zk-circuits-ea23387a0e1e&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23zk&quot;&gt;#zk&lt;/a&gt; &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 安全研究和案例&lt;a href=&quot;https://muellerberndt.medium.com/finding-soundness-bugs-in-zk-circuits-ea23387a0e1e&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Medium&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;A Practical Guide to Finding Soundness Bugs in ZK Circuits.&quot; src=&quot;/static/https://cdn4.telesco.pe/file/SL9kIINr3rHEB172XtkuUuJeROH8YwF-TvCcjiPus8y1D0BCrjqLrn1QfXz3m3-NuEGkOe2o5vM-acDkYdWkKPklMKLWWPQV0M3tn-NGmJOrzurm0xY9k6FmwZUts5Puq1Esc6BwkCgxLX82UY6FmyBMYulOsvHFTJR5AR1yv70f3Tr5Nf5zryqr9lTHMRMmd0L7c33RTWIHlb1HjqgfyBXK2SDNzCIrQUGJt_6gbFQj5hDRR79z_qKwwKzeY8Yn0Q5FN8U2S8OE9BL6C5D_WxbhOCbTFbTI2NtjS7GKuFqy8hm4N01QSSBWNiG-04MAoAN0zLRZOxopYxoNF-JwJQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;A Practical Guide to Finding Soundness Bugs in ZK Circuits.&lt;/div&gt;
  &lt;div&gt;Zero-knowledge proofs are a core building block for blockchain scaling and privacy. In real-world deployments, the fragile part is usually…&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2101</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2101</guid><pubDate>Sat, 29 Nov 2025 19:37:45 GMT</pubDate><content:encoded>&lt;a href=&quot;https://hacken.io/insights/order-book-security-vulnerabilities/&quot; target=&quot;_blank&quot;&gt;https://hacken.io/insights/order-book-security-vulnerabilities/&lt;/a&gt;&lt;br /&gt;链上订单簿可能存在的 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 安全漏洞&lt;a href=&quot;https://hacken.io/insights/order-book-security-vulnerabilities/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Hacken&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;19 Security Pitfalls in On-Chain Order Books (and How to Fix Them)&quot; src=&quot;/static/https://cdn4.telesco.pe/file/n9bmbmwxhn36RFLp26rM9uZX6p33uD8q_2ie-l_VuOKbZfIVsi7RKhcIiRQZa7dpZD08tipd9seAzrWeuGtDecntyoAd4280VkiMHGhrr_SMfj2SHDp1W6ER5sH7WMkR1gOrCTX58XkZBEL0McGCX7nX-cvcd-vilZvzMdkX_c_7hVQBWpLRjDw7PmLh783RmX1Pnr9XjkTqsgzWM5xkAT5fc3PHk8oOQgVOi4lttpD3y_tbXj8lI6dg8dOy4-IF3zXsxusZaHTjVWh9Xh91hF_wRJHxSz0ErsudeKdQXUrgx6Svo_nA-RqDILcgN973J6dcf9dpyuz5zZxYcWbvgA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;19 &lt;mark&gt;Security&lt;/mark&gt; Pitfalls in On-Chain Order Books (and How to Fix Them)&lt;/div&gt;
  &lt;div&gt;On-chain order books look great on paper. You get full transparency, composability with the rest of DeFi, and a clean story for users and regulators: “everything is on-chain.”&lt;br /&gt;&lt;br /&gt;But once you start implementing them, things get messy fast. Edge cases around…&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2093</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2093</guid><pubDate>Wed, 05 Nov 2025 11:28:41 GMT</pubDate><content:encoded>&lt;a href=&quot;https://www.coinspect.com/blog/balancer-rate-manipulation-exploit/&quot; target=&quot;_blank&quot;&gt;https://www.coinspect.com/blog/balancer-rate-manipulation-exploit/&lt;/a&gt;&lt;br /&gt;balancer 被盗 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 分析&lt;a href=&quot;https://www.coinspect.com/blog/balancer-rate-manipulation-exploit/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Coinspect Security&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Balancer V2 Stable Pools Exploit — Rate Manipulation&quot; src=&quot;/static/https://cdn4.telesco.pe/file/FEkgDcMSgmSrSWmsYlileBuhNPo5fYDnw2ckgMYG6H5vsYyrmi3ikGIr0ceOGiqV2erdjTtH4zYrGI0neRObNsf07NoGXe8-YKlNSmCJIRNiMxXGdfqfMlDAqA0-GRvccblaCbh_sQB_PZQ8n8ODHnU-_Dnesgu0-mCpest1vAvwNv54U5_aqdlI2ZkZbwzDXbkiqHzVy1wrqsIO0Yzk_9I1h3_ejuMas5GalRZ59h3fw4-_E4rHgfKFssGqnYDz87Y9-6FOLgf67y4EdeVcyh2uthirE-u3pHTjjOsYKE4c2ZiiwU3sRlUys5bIXq-Vcf8BV7RmKLwuCFHCdkEKoA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Balancer V2 Stable Pools Exploit — Rate Manipulation&lt;/div&gt;
  &lt;div&gt;An attacker exploited a rounding issue in the calculation of the stable swap invariant, deflating the implied BPT price and extracting value via internal balances and a...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/2061</link><guid isPermaLink="true">https://www.web3list.xyz/posts/2061</guid><pubDate>Tue, 16 Sep 2025 15:10:10 GMT</pubDate><content:encoded>&lt;a href=&quot;https://www.coinspect.com/learn-evm-attacks/&quot; target=&quot;_blank&quot;&gt;https://www.coinspect.com/learn-evm-attacks/&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23EVM&quot;&gt;#EVM&lt;/a&gt; &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; Hack Poc&lt;a href=&quot;https://www.coinspect.com/learn-evm-attacks/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Coinspect Security&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Learn Real Smart Contract Security | Coinspect Security&quot; src=&quot;/static/https://cdn4.telesco.pe/file/Fl0Ro3nQ_4MjJaRSi61A_pypaTCn_fzQzZ78SbI-gSoD3L_seFq57j-S7Y0JWOn1O2C0Xer3MaEmvkykj3daMhe4WE7HIsWFhj4tpzxFCXuF0JixweF79pClEui2tmWEnQwqYYZGkkbOUPDpxWOprVHCO4rzEmlzGCO9-f4UKfNsQDOQoHZFDsIpXWK03nZtAzPGmtfb9sPVP6kapUQQpkcsjmX_PZijlvtdwiVGcA8U-pp6ecPA2-FV4JFluJyUimiL6Zt4qLq63QEM3thu3_fOmqO_XpwxX2Xr1ZpnKKiR1xhaJ7wLFqQtXi-pPtNBUWXTFPgDP4yC-fwGVPu9tA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Learn Real Smart Contract &lt;mark&gt;Security&lt;/mark&gt; | Coinspect &lt;mark&gt;Security&lt;/mark&gt;&lt;/div&gt;
  &lt;div&gt;Study real-world DeFi vulnerabilities through a curated collection of realistic, Foundry-based reproductions.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1885</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1885</guid><pubDate>Fri, 28 Feb 2025 11:45:14 GMT</pubDate><content:encoded>&lt;a href=&quot;https://getrecon.substack.com/p/the-right-way-to-multisig&quot; target=&quot;_blank&quot;&gt;https://getrecon.substack.com/p/the-right-way-to-multisig&lt;/a&gt;&lt;br /&gt;多签安全 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 最佳实践&lt;a href=&quot;https://getrecon.substack.com/p/the-right-way-to-multisig&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Substack&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;The Right Way To Multisig&quot; src=&quot;/static/https://cdn4.telesco.pe/file/JdXXrx0oszGADiJVvT9mN6e1AEcg_7CkISAX1C2Z0wpQI1SDI8KGMny6Sq6OJ66eodlBMjPCZMPSHuVfZN9XAInhnyfVQqOXDaNjDQnxqmJ3m8ndB0QBA1WQrornDvLqSBNyVq8n4EM8EJ4HzSSXz6HyYdJLA6xfTJLTIGSdR8mwwIsrYURa04yzvcLxdw2OWarrNZKtRmmb2OJb5ATVq1MpjCn03vcvsoeJeSErcgomx5hyefdYZhSI7EKBOgL7H_xW4q_xZfpxwDIKwUxhj2gFA3cICdB0p2lSuSmcZz482p8355QwGGWmXR0E-Djoa16kx3bnOrMNZq4CIWc9tg.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;The Right Way To Multisig&lt;/div&gt;
  &lt;div&gt;How to implement best practices in multisig &lt;mark&gt;security&lt;/mark&gt; to prevent your protocol from getting rekt.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1862</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1862</guid><pubDate>Tue, 11 Feb 2025 09:41:44 GMT</pubDate><content:encoded>&lt;a href=&quot;https://osec.io/blog/2025-02-10-hitchhikers-guide-to-aptos-fungible-assets&quot; target=&quot;_blank&quot;&gt;https://osec.io/blog/2025-02-10-hitchhikers-guide-to-aptos-fungible-assets&lt;/a&gt;&lt;br /&gt;介绍了 Aptos 内复杂的同质化代币标准及 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 相关安全事项&lt;a href=&quot;https://osec.io/blog/2025-02-10-hitchhikers-guide-to-aptos-fungible-assets/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;OtterSec&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Hitchhiker&apos;s Guide to Aptos Fungible Assets&quot; src=&quot;/static/https://cdn4.telesco.pe/file/dpg2O0csjxFdCaFSCSyfHxjoJbMoUQnDLHihGx0YikdaCiATecX63NRjv5Dsjs_hKWrCkg-466PSEt3xdiuvNUkmP9xbXD0e7rWE7Z8HlsXm0pO37KXVLxyWg20McKxNWEMAtxfEgYwZSei75OF9yRnZRNbVe3K6QdgKwhYwIHEU5XlsAwoy2hUduZdLVMKC4visATHx4XhBOPXeY3rj7hRfhNMxu6JGG_pRPVbp6XOaQyDeQ-4fVr_Pg4Xk9Dkp6W1nSD-A0Qa0yTjhBtSd59WTnGpSLozKmrJydKfNc6ZDUny5f8pMmC6YM2AHgwNsEP_9Q4YnhyvTr4b5P06cSA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Hitchhiker&apos;s Guide to Aptos Fungible Assets&lt;/div&gt;
  &lt;div&gt;We take a deep dive into Aptos’ implementation of fungible assets, exploring the intricacies hidden within its functions, objects, and interactions. While the Fungible Asset model was designed to address the limitations and &lt;mark&gt;security&lt;/mark&gt; flaws of the legacy Coin…&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1861</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1861</guid><pubDate>Mon, 10 Feb 2025 16:08:08 GMT</pubDate><content:encoded>&lt;a href=&quot;https://blog.openzeppelin.com/web3-security-auditors-2024-rewind&quot; target=&quot;_blank&quot;&gt;https://blog.openzeppelin.com/web3-security-auditors-2024-rewind&lt;/a&gt;&lt;br /&gt;2024 年 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 漏洞报告&lt;a href=&quot;https://blog.openzeppelin.com/web3-security-auditors-2024-rewind?utm_campaign=Audit%20Reports%202024&amp;amp;utm_source=twitter&amp;amp;utm_medium=social&amp;amp;utm_term=AuditRewind&amp;amp;utm_content=InitialTweet&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Openzeppelin&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Web3 Security Auditor&apos;s 2024 Rewind&quot; src=&quot;/static/https://cdn4.telesco.pe/file/SBSO0xB6U9xgZu9YSxKQ3EW-tw3pq4nT275LLk-DoqfKBGAj-woyXwkkh-_mz-Q0cNgJnAC966mwFmwixR8vMTyb24GWFDjw3yDYLnlykBooRjLIACKEi2i5_sHRkGp6-AfMZJ2qrPj6mJi-ryJIBR8ixl2V5e-wUuEPcGhSx3Oxp6iESF6NptfrvZjKsIlm_JH8TYIJ81QgZVSV7vHn2WKB0Z_s0RUEAsQ_WBIyI_0pl8ftO_5VMAA8HviIWe-nBML11M5B5k4uYNF8_gf3FeJbfpPC5hKnmTOMppzIVLiNCtMqkjjcbcOUdO9CyP3yFtL6kyeOyLrNy89BaGebKg.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Web3 &lt;mark&gt;Security&lt;/mark&gt; Auditor&apos;s 2024 Rewind&lt;/div&gt;
  &lt;div&gt;Welcome to the Web3 &lt;mark&gt;Security&lt;/mark&gt; Auditor&apos;s 2024 Rewind, a collection of succinct technical breakdowns of notable &lt;mark&gt;security&lt;/mark&gt; incidents and vulnerabilities from the past year.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1860</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1860</guid><pubDate>Mon, 10 Feb 2025 15:59:08 GMT</pubDate><content:encoded>&lt;a href=&quot;https://hatsfinance.medium.com/guest-spotlight-article-how-to-analyze-reports-and-become-a-great-auditor-8429e20df2c2&quot; target=&quot;_blank&quot;&gt;https://hatsfinance.medium.com/guest-spotlight-article-how-to-analyze-reports-and-become-a-great-auditor-8429e20df2c2&lt;/a&gt;&lt;br /&gt;列举了作者在 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 审计报告内读到的有趣例子&lt;a href=&quot;https://hatsfinance.medium.com/guest-spotlight-article-how-to-analyze-reports-and-become-a-great-auditor-8429e20df2c2&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Medium&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Guest Spotlight Article: How to analyze reports and become a great auditor&quot; src=&quot;/static/https://cdn4.telesco.pe/file/qB8uNOc2IzmLcNicwyM50XkJab-7lDLTr5h8i4ev_s8rdQfeMHbxAGoSXhk3XKhLvIDY5ybLCTMP0opGyRODtLuwxF4AXcGgYWF1_Md3fgNX0rtmfa0YOp_fUapDWmnjQwIybOB9yQrZ065X4t3aSVJ0YZHMa5PJMSerWeICvBJklWBtyXIIX0xyqKp2AaGF4QiacLnnogmIutg29t-Rb9BDgZFBq-pppMVaLhnBoRxIpegtv36uX-PygBMDdR-DgyyWED2VgCJIdtwKZbTRZkD17wji0PqhJ2x4b7mV-mScOAp2y3yQHkSyrEinGbZqVtbH4MhfoUYz3L7jhbSMGw.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Guest Spotlight Article: How to analyze reports and become a great auditor&lt;/div&gt;
  &lt;div&gt;The following content has been kindly guest contributed by bogo, as part of the &lt;mark&gt;Security&lt;/mark&gt; Researcher Content Contributor Programme.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1849</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1849</guid><pubDate>Fri, 31 Jan 2025 05:59:35 GMT</pubDate><content:encoded>&lt;a href=&quot;https://a16zcrypto.com/posts/article/generalized-property-tests-for-erc4626-vaults/&quot; target=&quot;_blank&quot;&gt;https://a16zcrypto.com/posts/article/generalized-property-tests-for-erc4626-vaults/&lt;/a&gt;&lt;br /&gt;ERC4626 测试组件 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt;&lt;a href=&quot;https://a16zcrypto.com/posts/article/generalized-property-tests-for-erc4626-vaults/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;a16z crypto&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Generalized property tests for ERC4626 vaults - a16z crypto&quot; src=&quot;/static/https://cdn4.telesco.pe/file/lRnen6IUVM5M8I8yfnXZyXQReij4FNwYLWfN51eCjhiLn0OOYaC9ZiiadwKL8PN2B24AnKw75woIpBopnCKmXn4YBxo2IbIRwxdLJ_lT_UnexpPsIXi1p_t7-dIr_ZqVVeD_ZeYjwSelj7oH8taEq79TGLUydy2HPmbznEFXgbmw1kAqBrydMtU1vBVL_1FGjhKNk4pacttjHGrz946mRSv3wneqQBUHkJxUiqFdaOv75r9siOc0XRLOtNPjbU_XHrLpuXeClXuiTitv0RxuPUtkF6sI_WoG1PgFFHglA_j8gT75wo42wiypy3fLUuwB7js0dsppB2zqvAYvlG3XyQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Generalized property tests for ERC4626 vaults - a16z crypto&lt;/div&gt;
  &lt;div&gt;ERC4626 property tests for fuzzing and symbolic execution to help vault builders detect standard violations&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1834</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1834</guid><pubDate>Fri, 17 Jan 2025 11:25:04 GMT</pubDate><content:encoded>&lt;a href=&quot;https://threesigma.xyz/blog/defi-front-end-exploits&quot; target=&quot;_blank&quot;&gt;https://threesigma.xyz/blog/defi-front-end-exploits&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23defi&quot;&gt;#defi&lt;/a&gt; 前端 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 安全问题&lt;a href=&quot;https://threesigma.xyz/blog/defi-front-end-exploits&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Three Sigma&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;DeFi Front-End Exploits &amp;amp; Security Threat Detection | Three Sigma&quot; src=&quot;/static/https://cdn4.telesco.pe/file/DsNafODSWTSylm8nkw3Bp56wJsdz-OlehIF9iubnxYyHToOrvp6GPxMl5zHJOCl0eUfaaJOtj4ES45UVhY3jxJMi-KEZIhsa5zg_OC5_N0sL7Lm3YEchtIH4t-Jf6SYiXYDNq4IZyMJxbK_cWWJ_mPFAWP5NxQcr5wOBs27xE_gpYTd4ebagDNFFW91FG_ZVVQDFA5MW_zJdKcoanywPoEfjCMJuOsay2YkEK1ukvXEZZtqBxoK3RJuYB0e_sOLWpnANmPH4Gb3dYfYMwzKa0axq2sP21Oln5pibwhiXMWcs1ALu_gY31h04tD6gLrrhYMEUU8_QYG11nX0y270iEQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;DeFi Front-End Exploits &amp;amp; &lt;mark&gt;Security&lt;/mark&gt; Threat Detection | Three Sigma&lt;/div&gt;
  &lt;div&gt;Phishing, DNS hijacks, and front-end exploits drain user funds and TVL. Get a proven defi threat detection platform to stop threats and protect dapps.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1817</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1817</guid><pubDate>Sun, 05 Jan 2025 12:04:19 GMT</pubDate><content:encoded>&lt;a href=&quot;https://zokyo-auditing-tutorials.gitbook.io/zokyo-tutorials&quot; target=&quot;_blank&quot;&gt;https://zokyo-auditing-tutorials.gitbook.io/zokyo-tutorials&lt;/a&gt;&lt;br /&gt;一份关于审计 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 的教程资料&lt;a href=&quot;https://zokyo-auditing-tutorials.gitbook.io/zokyo-tutorials&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;zokyo-auditing-tutorials.gitbook.io&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Zokyo Auditing Tutorials&quot; src=&quot;/static/https://cdn4.telesco.pe/file/Ysuy4eMCTfdR5JjXlyawUQuWY00-wC6ctZsWEnsyO0Tm3EJ6c-DjXOmdg9tAnA251ifbNwRYwfdQ0bgS2BKmZ-z8BL2xmBpzGTIA43BmKkuAjOeD2wOEzN8YFNRBrLGYEQc5WyeVa0O91KWXq32n8UJVmQ1i_a8E06YB54j-z1bTnCD474L27QQHVz7BoKaGiRFX4NoZtFPfscTJOCf_lGu___6dFwSny_VfZQC0kvJeoNM6kxs4Rf4Dux4FNtChHBNDLdALnw3_ZWSStw19CC4qAdp85--CpCdUrNG0V8g3ccjbW294dlGa9XmZQhk10Pwxk1wF5QPIbRQ7TpMwaw.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Zokyo Auditing Tutorials&lt;/div&gt;
  
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1809</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1809</guid><pubDate>Mon, 30 Dec 2024 18:15:00 GMT</pubDate><content:encoded>&lt;a href=&quot;https://mirror.xyz/0x3Cc99bfc69575CFA83658CAb5256D98143a2aAaa/FO6bCbBCGdLxzQXGuT4BUkSUjECnLPetJluT4e5U7Ko&quot; target=&quot;_blank&quot;&gt;https://mirror.xyz/0x3Cc99bfc69575CFA83658CAb5256D98143a2aAaa/FO6bCbBCGdLxzQXGuT4BUkSUjECnLPetJluT4e5U7Ko&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 代码审计的工作流</content:encoded></item><item><link>https://www.web3list.xyz/posts/1750</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1750</guid><pubDate>Sat, 30 Nov 2024 01:24:29 GMT</pubDate><content:encoded>&lt;a href=&quot;https://theredguild.org/&quot; target=&quot;_blank&quot;&gt;https://theredguild.org/&lt;/a&gt;&lt;br /&gt;以太坊 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 安全公共物品激励&lt;a href=&quot;https://theredguild.org/&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;theredguild.org&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;The Red Guild&quot; src=&quot;/static/https://cdn4.telesco.pe/file/mKmy_hqf_aRVvcQLGlPZepxuyP27zcp8invLja2woWjJZ3Z2EY00roQRVqLkxx11UwnL7detwhcVrBxaRAHlTDrYLNFTHZSYqAcJxvRPuvmkANFXVO8vuZVoT15_-29HTo-QfY6SgWLxU50g8UQ3fBKfuFKAOVZdQ0tEof7EdknvPGpUf08YiEnabRFf0kgLfDbzaoEWMBhXQiRLXw1aDn5wDE2u6_B5YsRZsQtsAocD7cSS02v3nQMpQmFymF6zoRj3jrW0YCzroKgxuzimgOg4yGARa3LMtzFUa0kwpVqer4Qc-MJYjzrTbRXl4fzzIXU_n0aAMY73-Pnh4i_noQ.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;The Red Guild&lt;/div&gt;
  &lt;div&gt;The Red Guild (TRG) advances &lt;mark&gt;security&lt;/mark&gt;, education, and open-source tools in the crypto ecosystem. Challenges, resources, and audits for the community.&lt;/div&gt;
&lt;/a&gt;</content:encoded></item><item><link>https://www.web3list.xyz/posts/1722</link><guid isPermaLink="true">https://www.web3list.xyz/posts/1722</guid><pubDate>Tue, 19 Nov 2024 03:22:42 GMT</pubDate><content:encoded>&lt;a href=&quot;https://blog.sigmaprime.io/governance-dao.html&quot; target=&quot;_blank&quot;&gt;https://blog.sigmaprime.io/governance-dao.html&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;/search/%23DAO&quot;&gt;#DAO&lt;/a&gt; 的治理攻击案例分析与安全 &lt;a href=&quot;/search/%23security&quot;&gt;#security&lt;/a&gt; 建议&lt;a href=&quot;https://blog.sigmaprime.io/governance-dao.html&quot; target=&quot;_blank&quot;&gt;
  
  &lt;div&gt;Sigma Prime&lt;/div&gt;
  &lt;img class=&quot;link_preview_image&quot; alt=&quot;Common Vulnerabilities: Protocol Governance and DAOs - Smart Contracts&quot; src=&quot;/static/https://cdn4.telesco.pe/file/W1xLPb76Pu9-y3oLLgKKeqemASI88wVextcgWjxzjU97oAg7Eep25cuTFWaf7rgQYFk0jaqbUT6w1Fwzyig9MhnJBl40YSc6CIhWdnG3xJVXIy0S7ZY05sYHkLZwmBkiFDfIL4lmHTwOHMYYojZmweeoFfJuwa-Qz90_C7IeqsMfR1ywy-yTqvVEkA5N2ngwpnUvx4S64S0KT4njZyzw-6L3INSK3v8tARJF9VABplcNMHTAndOgEygY3HErgxNz7DN4a8ZyNBI4vbra4ZNiDlhbmE-sUUrBFJCkw8DZ8yBCcu53ddzkcN3ul1cH4_zs8pWe5zvTGsutmH_HzP8vCA.jpg&quot; loading=&quot;lazy&quot; /&gt;
  &lt;div&gt;Common Vulnerabilities: Protocol Governance and DAOs - Smart Contracts&lt;/div&gt;
  &lt;div&gt;Many DeFi Protocols have decentralised using DAOs and token governance. This article explores the common vulnerabilities in the...&lt;/div&gt;
&lt;/a&gt;</content:encoded></item></channel></rss>