To achieve composability in DeFi, many projects require external sources of truth or price feeds. This article explores the common vulnerabilities in the use of pricing and oracles with real-world examples.| Sigma Prime
Many DeFi Protocols have decentralised using DAOs and token governance. This article explores the common vulnerabilities in the governance of DAOs with real-world examples.| Sigma Prime
A summary of Ethereum's upgrades and their implications on smart contract functionality.| Sigma Prime
About the new Security Alliance and why we support it| Sigma Prime
A practical guide to safe choices and best practices when deploying proxies for a project| Sigma Prime
A rogue key attack on Gennaro et al. DKG for polynomials of excessive degree, allowing full control of the private key| Sigma Prime