THOUGHTS & INSIGHTS

Blog

Permanent DoS of refunds through 1 wei donation
Oct 26, 2025
3 min read

Permanent DoS of refunds through 1 wei donation

During a recent security audit of LI.FI's Eco integration, I discovered a denial-of-service (DoS) vulnerability in Eco's Vault contract that could prevent legitimate users from receiving their refunds.

Read article →
Access Control Flaw in Hyperlane's Rate-Limited ISM and Hook
Jun 27, 2025
3 min read

Access Control Flaw in Hyperlane's Rate-Limited ISM and Hook

Analysis of an access control vulnerability in Hyperlane's rate-limited interchain security module and hook implementation.

Read article →
Discovering a Vulnerability in Relay Bridge's Solver Signature API
Nov 20, 2024
3 min read

Discovering a Vulnerability in Relay Bridge's Solver Signature API

Security analysis of a critical vulnerability found in Relay Bridge's solver signature API affecting cross-chain message validation.

Read article →
Discovering a Vulnerability in Hyperlane's RateLimited ISM
Oct 17, 2024
3 min read

Discovering a Vulnerability in Hyperlane's RateLimited ISM

Uncovering a HIGH severity DoS vulnerability in Hyperlane's rate-limited ISM during a warp route assignment interview.

Read article →
Writing Cross-Chain PoC Using Pigeon
May 12, 2024
6 min read

Writing Cross-Chain PoC Using Pigeon

A comprehensive guide to writing proof-of-concept exploits for cross-chain vulnerabilities using Pigeon framework.

Read article →
Post-Mortem: Colluded Transmitters in Socket DL
Oct 6, 2023
4 min read

Post-Mortem: Colluded Transmitters in Socket DL

Deep dive into a critical vulnerability discovered in Socket's data layer involving colluded transmitters and cross-chain message validation.

Read article →
Unearthing a $7k SocketSurge LootBox Exploit: A Deep Dive
Oct 6, 2023
3 min read

Unearthing a $7k SocketSurge LootBox Exploit: A Deep Dive

How I claimed $7k from SocketSurge LootBox-II by exploiting Socket DL's defense mechanisms within two hours.

Read article →
Cross-Chain Immutability: Security Considerations
Mar 14, 2023
3 min read

Cross-Chain Immutability: Security Considerations

Understanding the concept of cross-chain immutability and its security implications for bridging protocols and multi-chain applications.

Read article →
Data Paths: Essential Guide for Cross-Chain Developers
Sep 19, 2022
3 min read

Data Paths: Essential Guide for Cross-Chain Developers

A comprehensive guide to understanding data paths in cross-chain communication for developers building multi-chain applications.

Read article →
Dynamic Memory Arrays in Solidity
Mar 26, 2022
2 min read

Dynamic Memory Arrays in Solidity

A practical guide to understanding and implementing dynamic memory arrays in Solidity smart contracts with code examples.

Read article →
Decoding Investing: The Brain Language
Mar 22, 2022
5 min read

Decoding Investing: The Brain Language

Exploring how the Ventromedial Prefrontal Cortex influences investment decisions, fear-greed dynamics, and the psychology behind market behavior.

Read article →