Blog

Stay at the forefront of the industry with our timely news updates and deep-dive educational pieces

Blog
Learn how the OXORIO team conducted a comprehensive security audit of the Zunami protocol, uncovering critical vulnerabilities in yield farming aggregators. Discover the identified bugs, their potential impact on DeFi investments, and recommendations to enhance blockchain security.

Unveiling Critical Vulnerabilities: OXORIO's In-Depth Audit of Zunami Protocol

Learn how the OXORIO team conducted a comprehensive security audit of the Zunami protocol, uncovering critical vulnerabilities in yield farming aggregators. Discover the identified bugs, their potential impact on DeFi investments, and recommendations to enhance blockchain security.

14 October, 2024

Case Study

OXORIO's audit uncovers critical vulnerabilities in Rho Protocol's DeFi derivatives market. Explore interest rate swaps, perpetual futures, and the security challenges in decentralized finance.

Unveiling the Hidden Flaws: OXORIO's Deep Dive into Rho Protocol's DeFi Derivatives

OXORIO's audit uncovers critical vulnerabilities in Rho Protocol's DeFi derivatives market. Explore interest rate swaps, perpetual futures, and the security challenges in decentralized finance.

7 October, 2024

Case Study

Explore the hands-on practicality of the Safe Anonymization Module (SAM) and the unique advantages of the Noir DSL in anonymizing transaction data. This workshop details generating Zero-Knowledge Proofs (ZKP) and managing anonymous transactions efficiently using SAM on the Safe network

Workshop: Using Noir for Building an Anonymization Module

Explore the hands-on practicality of the Safe Anonymization Module (SAM) and the unique advantages of the Noir DSL in anonymizing transaction data. This workshop details generating Zero-Knowledge Proofs (ZKP) and managing anonymous transactions efficiently using SAM on the Safe network

5 July, 2024

Case Study

Discover the innovative power of Noir, a Domain-Specific Language from Aztec Protocol, transforming SNARK proving systems. Learn how Noir's streamlined syntax and extensive features can elevate your blockchain projects, enabling more secure and efficient cryptographic operations.

Noir Explained: Features and Examples

Discover the innovative power of Noir, a Domain-Specific Language from Aztec Protocol, transforming SNARK proving systems. Learn how Noir's streamlined syntax and extensive features can elevate your blockchain projects, enabling more secure and efficient cryptographic operations.

18 June, 2024

Case Study

Discover Lido's Dual Governance Strategy: Lido Ecosystem Grants Organisation's latest proposal aims to empower stETH holders with veto powers to safeguard their interests against DAO decisions.

Lido Explained: Dual Governance

Discover Lido's Dual Governance Strategy: Lido Ecosystem Grants Organisation's latest proposal aims to empower stETH holders with veto powers to safeguard their interests against DAO decisions.

17 June, 2024

Case Study

 Understand how Lido secures user funds, maximizes staking returns, and ensures transparency and efficiency through cutting-edge technology. Perfect for blockchain enthusiasts eager to deepen their knowledge of decentralized finance operations.

Lido explained, Part 3 : Deposit & Oracles

Understand how Lido secures user funds, maximizes staking returns, and ensures transparency and efficiency through cutting-edge technology. Perfect for blockchain enthusiasts eager to deepen their knowledge of decentralized finance operations.

24 May, 2024

Case Study

Dive into the intricacies of Ethereum Consensus and Lido's withdrawal module in this comprehensive guide. Understand the key components, from the Beacon Chain to validator lifecycle, and how they shape the protocol's security and functionality

Lido Explained, Part 2: Consensus & Withdraw

Dive into the intricacies of Ethereum Consensus and Lido's withdrawal module in this comprehensive guide. Understand the key components, from the Beacon Chain to validator lifecycle, and how they shape the protocol's security and functionality

22 February, 2024

Case Study

Discover the journey of Lido, a key player reshaping Ethereum staking. This article takes you from Lido's early beginnings, through the complexities of Ethereum staking, to the innovative solutions Lido offers.

Lido Explained, Part 1: History & Architecture

Discover the journey of Lido, a key player reshaping Ethereum staking. This article takes you from Lido's early beginnings, through the complexities of Ethereum staking, to the innovative solutions Lido offers.

1 February, 2024

Case Study

Discover Lido's V2 impact on Ethereum staking, focusing on user behavior, withdrawals, and stETH dynamics post-Shapella upgrade.

On-chain Analysis of Lido Unstaking

Discover Lido's V2 impact on Ethereum staking, focusing on user behavior, withdrawals, and stETH dynamics post-Shapella upgrade.

24 October, 2023

Case Study

Understand the double breach of Balancer, a major AMM protocol, due to vulnerabilities in old-versioned pools and rounding calculations, leading to a significant loss across various networks.

Friendly Fire: How Balancer’s Openness Led to a Double Breach

Understand the double breach of Balancer, a major AMM protocol, due to vulnerabilities in old-versioned pools and rounding calculations, leading to a significant loss across various networks.

5 October, 2023

Case Study

Learn from the Curve exploit - crucial insights for the crypto community on redefining security practices, understanding compiler vulnerabilities, and the importance of ongoing contract migrations.

What crypto community has to redefine after the Curve exploit

Learn from the Curve exploit - crucial insights for the crypto community on redefining security practices, understanding compiler vulnerabilities, and the importance of ongoing contract migrations.

15 August, 2023

Case Study

Discover essential non-obvious precautions for DAO security, learning from the Tornado Cash Governance hack, with insights into metamorphic contracts and defense strategies.

Non-obvious precautions for DAO security

Discover essential non-obvious precautions for DAO security, learning from the Tornado Cash Governance hack, with insights into metamorphic contracts and defense strategies.

30 May, 2023

Case Study

Articles weren't found

Nothing found

Nothing found

Have a question?

Have a question?

Stay Connected with OXORIO

We're here to help and guide you through any inquiries you might have about blockchain security and audits.