-
Hi there, a friend forwarded me your slides and it does indeed interests me but after reading through your docs I still don't know what you're trying to accomplish. What's your use case?
-
In a Pyanodon project, if you select "Use best modules" in the modules dropdown on upper-right, it often selects the Efficiency Modules.
This result is mostly false. The Speed or Prod modules are m…
-
# Lines of code
https://github.com/code-423n4/2023-09-maia/blob/main/src/RootPort.sol#L350-L353
# Vulnerability details
## Impact
- Attackers can gain control of User's Virtual Accounts and steal …
-
I am facing an issue while using the OWASP dependency check in my Java application with maven plugin and getting error related to certificate validation for **nvd.nist.gov**
My environment contains…
-
In this screen, it would be helpful to show the contract hash that's being called. If the call is via the contract package, then show the contract package hash and the version number.
![image](http…
-
Location: [Libera.chat, #monero-research-lab](https://libera.chat/) | [Matrix](https://matrix.to/#/#monero-research-lab:monero.social?via=matrix.org&via=monero.social)
[Join the Monero Matrix serve…
-
Novelty as a design requirement makes sense to prevent existing hardware miners from being used for mining on the Nervos network. However, so little is known about the security of Eaglesong, that it i…
-
## About the Hackathon? 🌖
The future is web3: a digital world that is censorship-resistant, decentralized, and trustless. A web where users control their own data and identity. This is a community …
-
First, thank you for your valuable work and support:
Is it possible to run FlowDroid on binaries of system services, e.g., to taint one parameter across methods of the application framework and als…
-
As posted in https://whatisnuclear.com/blog/2022-04-16-renaming-nuclear.html, we need to rename nuclear. I'll close this ticket once we do that.