НОВОСТИ

Свежее в безопасности DeFi & Web3

Курация из публичных RSS-каналов security-публикаций. Записи с пометкой silvexcode note содержат редакционные комментарии.

Обновлено: · записей: 30

2026-05-12 Quantstamp
April 2026 Security Beat: Same Actors, New Targets

April was undoubtedly a rocky month in security. $635M was lost across 28 crypto incidents. The Axios npm package was compromised on day one, exposing an estimated 600,000 installs in three hours. Vercel was breached…

2026-05-12 OpenZeppelin
Four Layers of DeFi Risk: A Security Framework for Financial Institutions

JPMorgan recently made headlines by citing persistent security flaws as a barrier to institutional DeFi participation, and the numbers behind that are hard to ignore: Bybit ($1.5 billion), KelpDAO ($292 million), Drift…

2026-05-12 Trail of Bits
Go fuzzing was missing half the toolkit. We forked the toolchain to fix it.

Go’s native fuzzing is useful, but it stands far behind state-of-the-art tooling that the Rust, C, and C++ ecosystems offer with LibAFL and AFL++. Path constraints are hard to solve. Structured inputs usually need…

2026-05-11 OpenZeppelin
AI-Powered Security at the Speed of Development: Introducing the OpenZeppelin Continuous Security Program

Modern onchain systems don't behave like the ones traditional security models were built for. Code ships continuously, architectures evolve, and a clean security report from six months ago says little about a system…

2026-05-08 OpenZeppelin
Yearly Allowance Contract Audit

Summary

2026-05-07 OpenZeppelin
Token Operations FHE Contracts Audit

Summary Type: Blockchain Infrastructure Timeline: From 2026-03-16 → To 2026-04-02 Languages: Solidity Findings Total issues: 18 (16 resolved, 1 partially resolved) Critical: 0 (0 resolved) · High: 0 (0 resolved) ·…

2026-05-06 OpenZeppelin
OpenZeppelin Relayer Adds Support for Zama FHEVM

The OpenZeppelin Relayer now supports Zama FHEVM, bringing transaction infrastructure to confidential smart contract applications.

2026-05-05 Trail of Bits
C/C++ checklist challenges, solved

We recently added a C/C++ security checklist to the Testing Handbook and challenged readers to spot the bugs in two code samples : a deceptively simple Linux ping program and a Windows driver registry handler. If you…

2026-05-04 OpenZeppelin
Blockchain Network Risk for Regulated Finance: A Technical Risk Assessment of Six Networks

Financial institutions are no longer asking whether to deploy onchain. They are asking which network, with what guarantees, and what happens when something goes wrong - and their regulators are demanding answers.

2026-04-30 OpenZeppelin
Starter Apps on Sui: The Marketplace Reference Build

In partnership with the Sui Foundation, OpenZeppelin has been equipping developers with tools to build production-ready applications on Sui, including libraries for DeFi Math and Access Management in OpenZeppelin Move…

2026-04-29 OpenZeppelin
Critical Bug Patterns in Sui Move: Lessons from Real Audits

Introduction Move’s type system prevents entire classes of bugs that plague Solidity. Objects can’t be copied or silently dropped, ownership is enforced by both the type system and the runtime, and there's no dynamic…

2026-04-29 Trail of Bits
Extending Ruzzy with LibAFL

LibAFL is all the rage in the fuzzing community these days, especially with LLVM’s libFuzzer being placed in maintenance mode . Written in Rust, LibAFL claims improved performance, modularity, state-of-the-art fuzzing…

2026-04-28 OpenZeppelin
Stellar Contracts RC v0.7.0 Audit

Summary Type: Library Timeline: From 2026-03-02 → To 2026-03-19 Languages: Rust Findings Total issues: 21 (18 resolved) Critical: 0 (0 resolved) · High: 1 (1 resolved) · Medium: 6 (5 resolved) · Low: 9 (7 resolved)…

2026-04-28 OpenZeppelin
Private State Management on Miden: Inside Guardian

OpenZeppelin worked with Miden, a privacy blockchain, to build Guardian: a coordination layer for private accounts that supports synchronization, backup, recovery, and multi-party signing without custody and without…

2026-04-23 Trail of Bits
Trailmark turns code into graphs

We’re open-sourcing Trailmark , a library that parses source code into a queryable call graph of functions, classes, call relationships, and semantic metadata, then exposes that graph through a Python API that Claude…

2026-04-17 Trail of Bits
We beat Google’s zero-knowledge proof of quantum cryptanalysis

Two weeks ago, Google’s Quantum AI group published a zero-knowledge proof of a quantum circuit so optimized, they concluded that first-generation quantum computers will break elliptic curve cryptography keys in as…

2026-04-09 Trail of Bits
Master C and C++ with our new Testing Handbook chapter

We added a new chapter to our Testing Handbook: a comprehensive security checklist for C and C++ code . We’ve identified a broad range of common bug classes, known footguns, and API gotchas across C and C++ codebases…

2026-04-09 rekt.news
Transparent When You Want It, Private When You Need It

Public blockchains solved settlement. They didn't solve privacy. Institutions need to protect positions, counterparty relationships, and transaction amounts without abandoning transparency entirely - and every…

2026-04-07 Trail of Bits
What we learned about TEE security from auditing WhatsApp's Private Inference

WhatsApp’s new “Private Inference” feature represents one of the most ambitious attempts to combine end-to-end encryption with AI-powered capabilities, such as message summarization. To make this possible, Meta built a…

2026-04-03 Trail of Bits
Simplifying MBA obfuscation with CoBRA

Mixed Boolean-Arithmetic (MBA) obfuscation disguises simple operations like x + y behind tangles of arithmetic and bitwise operators. Malware authors and software protectors rely on it because no standard simplification…

2026-04-01 Trail of Bits
Mutation testing for the agentic era

Code coverage is one of the most dangerous quality metrics in software testing. Many developers fail to realize that code coverage lies by omission: it measures execution, not verification. Test suites with high…

2026-03-31 Trail of Bits
How we made Trail of Bits AI-native (so far)

This post is adapted from a talk I gave at [un]prompted , the AI security practitioner conference. Thanks to Gadi Evron for inviting me to speak. You can watch the recorded presentation below or download the slides …

2026-03-25 Trail of Bits
Try our new dimensional analysis Claude plugin

We’re releasing a new Claude plugin for developing and auditing code that implements dimensional analysis, a technique we explored in our most recent blog post . Most LLM-based security skills ask the model to find…

2026-03-24 Trail of Bits
Spotting issues in DeFi with dimensional analysis

Using dimensional analysis, you can categorically rule out a whole category of logic and arithmetic bugs that plague DeFi formulas. No code changes required, just better reasoning! One of the first lessons in physics is…

2026-03-11 Trail of Bits
Six mistakes in ERC-4337 smart accounts

Account abstraction transforms fixed “private key can do anything” models into programmable systems that enable batching, recovery and spending limits, and flexible gas payment. But that programmability introduces…

2026-02-25 Trail of Bits
mquire: Linux memory forensics without external dependencies

If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols aren’t typically installed on production systems and must be…

2026-02-23 rekt.news
Why Privacy Matters More Than Ever in 2026

Privacy is no longer a cypherpunk slogan - it’s turning into core blockchain infrastructure. Public blockchains proved they can move money quickly, but they also expose balances, relationships, and behavior permanently…

2026-02-20 Trail of Bits
Using threat modeling and prompt injection to audit Comet

Before launching their Comet browser, Perplexity hired us to test the security of their AI-powered browsing features. Using adversarial testing guided by our TRAIL threat model, we demonstrated how four prompt injection…

2026-02-18 Trail of Bits
Carelessness versus craftsmanship in cryptography

Two popular AES libraries, aes-js and pyaes, “helpfully” provide a default IV in their AES-CTR API, leading to a large number of key/IV reuse bugs. These bugs potentially affect thousands of downstream projects. When we…

2026-01-30 Trail of Bits
Celebrating our 2025 open-source contributions

Last year, our engineers submitted over 375 pull requests that were merged into non–Trail of Bits repositories, touching more than 90 projects from cryptography libraries to the Rust compiler. This work reflects one of…