-
-
## Steps to Reproduce Issue
Consider an empty project with the following `Move.toml`:
```toml
[package]
name = "test"
edition = "2024.beta" # edition = "legacy" to use legacy (pre-2024) Move
…
-
"Analyze user behavior across different lending protocols.
Steps:
1) Load the data on loans for all lending protocols from the Google Storage. For example, [https://storage.googleapis.com/derisk…
-
Flashloan44
High
# Liquidation can be DOSed due to lack of liquidity on collateral asset reserve
### Summary
Lack of liquidity on collateral asset reserves can cause disruption to liquidation.
#…
-
## Summary
> Please give a short summary of this research topic.
What are the typical security concerns associated with lending protocols, and how can these issues be addressed? An example is the …
-
**Describe the bug**
Create a simple ERC20 only Protocol where users can borrow until 20% of what they lended initially.
Only ERC20 should be allowed, and you can borrow one ERC20 against other ERC2…
-
# Inspiration
In life, there comes a time when we have to borrow money e.g. student loan, car loan, mortgage etc. Lending is an essential service in any financial system. Traditional lenders such as …
-
### Main Objectives/Goals:
The primary objective is to generate higher returns by using certain products on the BNB Chain. This initiative aims to enhance returns for users while attracting a substan…
-
DeRisk currently works with event data in a raw format where the relevant data (like the user, token, amount, etc.) is saved in a dictionary or list-like structure in one of the columns. To better ext…
-
## Summary
> Please give a short summary of this research topic.
In traditional finance, borrowing money from banks is common. Is there an equivalent approach for borrowing funds on the blockchain…