PinnedPublished inChainLight Blog & ResearchIntroducing DART — Digital Asset Risk TrackerToday, ChainLight has launched DART — a comprehensive security platform aimed at protecting users, exchanges, and project builders.Sep 15, 2023Sep 15, 2023
Published inChainLight Blog & ResearchExploring the Bitcoin L2 Saga and Recent SolutionsWe discuss the history of Bitcoin scaling solutions and introduce the architecture of recent projects, along with their inherent risks.Aug 21, 2024Aug 21, 2024
Published inChainLight Blog & ResearchFinding a Critical Vulnerability in Akash NetworkIn May 2024, ChainLight identified a critical vulnerability in Akash Network. This report provides an overview of the vulnerability.Jul 18, 2024Jul 18, 2024
Published inChainLight Blog & ResearchExploring Architectural Risks in RWA ProjectsIn this article, we analyze the structure of representative projects by category and discuss the potential risks they have.Jun 14, 2024Jun 14, 2024
Published inChainLight Blog & ResearchExploring Security Risks in AI Blockchain ProjectsWe analyze how decentralized infrastructure aims to solve the issues of centralized AI platforms, along with potential security concerns.Apr 25, 2024Apr 25, 2024
Published inChainLight Blog & ResearchExploring Finality Risks of Ethereum L2 From a CEX PerspectiveIn this article, we analyze how the transactions of Ethereum Layer 2 chains get finalized and observe the approaches of various CEXs.Dec 15, 2023Dec 15, 2023
Published inChainLight Blog & ResearchExploring Cross-chain Interoperability Protocols and Their Security MeasuresIn this article, we explore several cross-chain interoperability protocols’ structure, security measures and their limitations.Nov 25, 2023Nov 25, 2023
Published inChainLight Blog & ResearchAccount Abstraction Security GuideIn this article, we will analyze and categorize vulnerabilities discovered during security audits of projects implemented using AA.Nov 16, 20231Nov 16, 20231
Published inChainLight Blog & ResearchRetrospecting Unhealthy Order Allowance Vulnerability in Perpetual ProtocolOn October 3, 2022, ChainLight discovered a critical bug in the position value calculation mechanism in Perpetual Protocol.Nov 9, 2023Nov 9, 2023
Published inChainLight Blog & ResearchUncovering a ZK-EVM Soundness Bug in zkSync EraChainLight researchers identified a critical bug on the soundness of ZK-circuit in zkSync Era. This article explains how this bug works.Nov 2, 20232Nov 2, 20232