
Building with Bitcoin: A Survey of the Use of Its Scripting System Across Projects
A look into Bitcoin's scripting system and how several projects use Bitcoin's features in their own software ... Read More
Choosing a DeFi Protocol: Risks, Red Flags, and Recommendations
A guide to walk you through the key steps in deciding which protocol to invest in and give you the tools to assess the risks ... Read More

Breaking Down the Puzzles in ZK Hack V
A look into the three puzzles solved by the Zellic cryptography team for ZK Hack V ... Read More

EVM Trackooor: Tracking Anything and Everything on EVM Chains
Zellic is proud to announce the EVM trackooor, a framework for tracking and processing arbitrary data on blockchains ... Read More

Far From Random: Three Mistakes From Dart/Flutter’s Weak PRNG
A look into how an unexpectedly weak PRNG in Dart led to Zellic's discovery of multiple vulnerabilities ... Read More

Masamune: The Smart Contract Security Search Tool
Zellic is proud to announce Masamune, a curated index of audit reports, bug fixes, and technical documentation of numerous protocols ... Read More

Web3 Ping of Death: Finding and Fixing a Chain-Halting Vulnerability in NEAR
A look into how Zellic identified and helped fix a vulnerability in NEAR Protocol ... Read More
Two Vulnerabilities in gnark’s Groth16 Proofs
An analysis of two vulnerabilities Zellic discovered that broke zero-knowledge and soundness of gnark’s Groth16 proofs with commitments ... Read More

Introducing Movetool: A Move Bytecode Disassembler
A look into the Move binary format, Move assembly, and our tool that makes writing Move assembly easier ... Read More