Extropy Security Bytes: w10 2025Welcome to this week’s edition of Extropy Security Bytes, where we break down the latest security incidents, exploits, and vulnerabilities…2d ago2d ago
Extropy Security Bytes: w9 2025The crypto space continues to grapple with security threats, scams, and exploits that highlight the importance of robust security practices…Mar 3Mar 3
Audit-Driven Fix Secures Liquid Staking Token Against ManipulationA critical vulnerability was discovered in a recent audit of a project within the LUKSO ecosystem, impacting its liquid staking mechanism…Feb 21Feb 21
Using Formal Verification techniques when auditingAt Extropy we are continually striving to improve the quality of our audits to help ensure that our clients’ projects are safe from attack…Feb 17Feb 17
Extropy Security Bytes: w6 2025Welcome to this week’s Web3 security roundup, covering the latest hacks, exploits, and social engineering scams from 1st-8th Feb 2025. This…Feb 10Feb 10
Extropy Security Bytes: w4 2025Welcome to this week’s blockchain security roundup, brought to you by Extropy.io! In this series, we deliver bite-sized updates on the most…Jan 27Jan 27
2024 in reviewIn 2024 we continued our focus on zero-knowledge technology and security. We expanded our team, delivered impactful training to hundreds of…Dec 31, 2024Dec 31, 2024
This article illustrates the main sections of an audit report, using examples from recent audits…A typical report will contain the following sections :Sep 23, 2024Sep 23, 2024
Starklings5: Functions in CairoWe’re continuing our journey with Starklings Cairo, and this time, we’re diving into functions. Functions are a fundamental part of any…Sep 6, 2024Sep 6, 2024
Starklings04-Cairo: IfWe’re back with another article of Starklings Cairo. In this installment, we’ll explore if, the most basic (but still surprisingly…Aug 5, 2024Aug 5, 2024