The "Introducing: Traxus" priority contract in Marathon is, as you'll likely have figured out from the name, required to unlock access to the Traxus faction. It's by far the most difficult quest ...
A decentralized exchange (DEX) is often described in one sentence: “trade crypto without handing your funds to an exchange.” For users, it can feel like a quick wallet connection and a swap button.
Abstract: The reentrancy vulnerability is one of the most notorious vulnerabilities of smart contracts. It enables attackers to hijack the control flow of a smart contract by invoking a function as ...
Discover how AI-driven smart contract auditing detects vulnerabilities, improves security, and ensures safer blockchain deployments.
AI-based on-chain oracles can provide real-time protection against exploitation as they can monitor transactions in real-time ...
Discover the legality of flash loans amid US crypto politics, uncover key risks and smart contract vulnerabilities, and learn ...
OpenAI and Paradigm unveil EVMbench, a benchmark testing AI agents on smart contract security across 120 high-severity vulnerabilities.
AI agents are now being tested against real smart contract vulnerabilities after $3.4 billion was lost to crypto hacks in 2025 OpenAI introduces EVMbench to test whether AI agents can detect, fix, or ...
The exploit saw the Moonwell protocol exploited for $1.78 million after cbETH was mispriced at $1.12 instead of about $2,200, intensifying debate around AI-co-authored smart contracts. Moonwell, a ...
This repository implements the methodology described in the research paper "Decompiling Smart Contracts with a Large Language Model" (arXiv:2506.19624v1) for fine-tuning Llama 3.2 3B to convert EVM ...
Abstract: The rise of blockchain has brought smart contracts into mainstream use, creating a demand for smart contract generation tools. While large language models (LLMs) excel at generating code in ...