<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0">
<channel>
  <title>Crypto Training</title>
  <link>https://crypto.training/</link>
  <description>Web3 security engineering notes: Solidity, EVM internals, audits, MEV, bridges.</description>
  <language>en</language>
  <item>
    <title>Bonding Curves: The Math, the Protocols, and the Money</title>
    <link>https://crypto.training/blog/2026-03-04-bonding-curves/</link>
    <guid>https://crypto.training/blog/2026-03-04-bonding-curves/</guid>
    <pubDate>Wed, 04 Mar 2026 00:00:00 GMT</pubDate>
    <description>A comprehensive deep dive into bonding curves — from the integral calculus behind pricing to 17 real protocols (Uniswap, Curve, Balancer, Bancor, Friend.tech, Intuition, pump.fun, VRGDA, and more). How each curve shapes incentives, who benefits, and what breaks.</description>
  </item>
  
  <item>
    <title>A Decade of Account Abstraction, Finally Solved? EIP-8141 in 5 Minutes</title>
    <link>https://crypto.training/blog/2026-03-03-eip-8141/</link>
    <guid>https://crypto.training/blog/2026-03-03-eip-8141/</guid>
    <pubDate>Tue, 03 Mar 2026 00:00:00 GMT</pubDate>
    <description>Vitalik’s 2026 account abstraction thread reframes EIP-8141 as a minimal protocol primitive: frame transactions with sender and gas-payer authorization. Here is the short, practical breakdown.</description>
  </item>
  
  <item>
    <title>ERC-7579 vs Safe Modules: Deep Architecture, Ecosystem, and Security Tradeoffs</title>
    <link>https://crypto.training/blog/2026-02-19-smart-account-modules/</link>
    <guid>https://crypto.training/blog/2026-02-19-smart-account-modules/</guid>
    <pubDate>Thu, 19 Feb 2026 00:00:00 GMT</pubDate>
    <description>A code-first deep dive into Safe modules, Zodiac, ERC-7579 architecture, and major module implementations (Safe7579, Kernel, Nexus, OpenZeppelin, Rhinestone Core). Focused on feature power versus security risk with concrete Solidity references and dense Mermaid diagrams.</description>
  </item>
  
  <item>
    <title>Smart Accounts in Practice: Deep Technical Comparison of 10 Implementations</title>
    <link>https://crypto.training/blog/2026-02-18-smart-accounts/</link>
    <guid>https://crypto.training/blog/2026-02-18-smart-accounts/</guid>
    <pubDate>Wed, 18 Feb 2026 00:00:00 GMT</pubDate>
    <description>A code-first, risk-first deep dive of Coinbase, MetaMask, Thirdweb, Nexus, Light, Kernel, Safe, SimpleAccount, Solady, and Trust smart accounts: signature models, module systems, upgrades, replay controls, and security tradeoffs.</description>
  </item>
  
  <item>
    <title>EIP-4337 Evolution Deep Dive: v0.6 -&gt; v0.7 -&gt; v0.8 -&gt; v0.9</title>
    <link>https://crypto.training/blog/2026-02-17-eip-4337-evolution/</link>
    <guid>https://crypto.training/blog/2026-02-17-eip-4337-evolution/</guid>
    <pubDate>Tue, 17 Feb 2026 00:00:00 GMT</pubDate>
    <description>A code-first evolution map of ERC-4337 EntryPoint releases: what changed in each version, why it changed, what new risks were introduced, what audits fixed, and what &apos;battle-tested&apos; really means in practice.</description>
  </item>
  
  <item>
    <title>The Auditor Operating System: Repeatable Results in a Hostile Codebase</title>
    <link>https://crypto.training/blog/2026-02-14-auditor-operating-system/</link>
    <guid>https://crypto.training/blog/2026-02-14-auditor-operating-system/</guid>
    <pubDate>Sat, 14 Feb 2026 00:00:00 GMT</pubDate>
    <description>Auditing is a craft with artifacts: models, maps, experiments, and writeups. This post is an &apos;operating system&apos; for doing web3 security work that scales beyond vibes.</description>
  </item>
  
  <item>
    <title>DeFi Incident Patterns: Oracle Games, Rounding Edges, and the Same Bug in Three Costumes</title>
    <link>https://crypto.training/blog/2026-02-13-defi-incident-patterns-oracle-rounding/</link>
    <guid>https://crypto.training/blog/2026-02-13-defi-incident-patterns-oracle-rounding/</guid>
    <pubDate>Fri, 13 Feb 2026 00:00:00 GMT</pubDate>
    <description>Cream, PancakeBunny, and bZx are not three unrelated stories. They are variations of one meta-pattern: untrusted external state crossing into accounting. Here&apos;s how to spot the variants.</description>
  </item>
  
  <item>
    <title>Transaction Forensics with TX Graph: Reading Flash Loans, Routes, and MEV in the Receipt</title>
    <link>https://crypto.training/blog/2026-02-12-transaction-forensics-tx-graph/</link>
    <guid>https://crypto.training/blog/2026-02-12-transaction-forensics-tx-graph/</guid>
    <pubDate>Thu, 12 Feb 2026 00:00:00 GMT</pubDate>
    <description>Block explorers show what happened, not why it happened. This is a practical workflow for reconstructing intent using receipts, logs, and call graphs, with two mainnet transactions as examples.</description>
  </item>
  
  <item>
    <title>Rounding in DeFi: When Dust Becomes an Oracle</title>
    <link>https://crypto.training/blog/2026-02-11-rounding-in-defi/</link>
    <guid>https://crypto.training/blog/2026-02-11-rounding-in-defi/</guid>
    <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
    <description>Integer math is deterministic. Your rounding policy is not. This post connects fixed-point arithmetic, share accounting, and real exploit patterns where dust becomes profit.</description>
  </item>
  
  <item>
    <title>Uniswap v4 Hooks: Secure Design Patterns for Adversarial Integrations</title>
    <link>https://crypto.training/blog/2026-02-10-uniswap-v4-hooks-security/</link>
    <guid>https://crypto.training/blog/2026-02-10-uniswap-v4-hooks-security/</guid>
    <pubDate>Tue, 10 Feb 2026 00:00:00 GMT</pubDate>
    <description>Hooks let you extend AMMs with custom code. They also move your security boundary into a callback. This is how to design hooks that survive reentrancy, MEV, and rounding edge cases.</description>
  </item>
  
  <item>
    <title>A Practical Smart Contract Audit Workflow: From Threat Model to Finding</title>
    <link>https://crypto.training/blog/2026-02-09-auditing-workflow/</link>
    <guid>https://crypto.training/blog/2026-02-09-auditing-workflow/</guid>
    <pubDate>Mon, 09 Feb 2026 00:00:00 GMT</pubDate>
    <description>Good audits are structured: define invariants, map entry points, test the scary parts, and write findings that lead to fixes.</description>
  </item>
  
  <item>
    <title>Engineering ZK Prover Pipelines (With a Security Mindset)</title>
    <link>https://crypto.training/blog/2026-02-08-engineering-zk-prover-pipelines/</link>
    <guid>https://crypto.training/blog/2026-02-08-engineering-zk-prover-pipelines/</guid>
    <pubDate>Sun, 08 Feb 2026 00:00:00 GMT</pubDate>
    <description>ZK systems fail in boring ways: nondeterminism, mismatched parameters, and opaque errors. Build pipelines that make proofs reproducible and auditable.</description>
  </item>
  
  <item>
    <title>Audit Checklist: Safe ERC-20 Integration in a Hostile World</title>
    <link>https://crypto.training/blog/2026-02-06-audit-checklist-erc20-hooks/</link>
    <guid>https://crypto.training/blog/2026-02-06-audit-checklist-erc20-hooks/</guid>
    <pubDate>Fri, 06 Feb 2026 00:00:00 GMT</pubDate>
    <description>Treat token transfers as adversarial. Measure deltas, expect lies, and design accounting that survives hooky or weird tokens.</description>
  </item>
  
  <item>
    <title>Foundry for Security: Fuzzing, Invariants, and the Cheatcodes That Matter</title>
    <link>https://crypto.training/blog/2026-02-05-foundry-security-testing/</link>
    <guid>https://crypto.training/blog/2026-02-05-foundry-security-testing/</guid>
    <pubDate>Thu, 05 Feb 2026 00:00:00 GMT</pubDate>
    <description>Foundry turns security ideas into executable checks. Fuzz what you fear, encode invariants, and keep exploit tests as regression armor.</description>
  </item>
  
  <item>
    <title>Upgradeable Contracts: Initializers, UUPS Footguns, and Storage Discipline</title>
    <link>https://crypto.training/blog/2026-02-04-upgradeability-and-initializers/</link>
    <guid>https://crypto.training/blog/2026-02-04-upgradeability-and-initializers/</guid>
    <pubDate>Wed, 04 Feb 2026 00:00:00 GMT</pubDate>
    <description>Upgrades multiply risk. Most upgrade exploits are not fancy; they’re misconfigured initializers, storage collisions, or privileged upgrade paths.</description>
  </item>
  
  <item>
    <title>Gas Griefing and Untrusted Reverts: Liveness Is a Security Property</title>
    <link>https://crypto.training/blog/2026-02-03-evm-gas-myths/</link>
    <guid>https://crypto.training/blog/2026-02-03-evm-gas-myths/</guid>
    <pubDate>Tue, 03 Feb 2026 00:00:00 GMT</pubDate>
    <description>Most protocol failures aren’t about stealing funds. They’re about stopping progress. This is the gas-side of that story.</description>
  </item>
  
  <item>
    <title>Oracles and TWAPs: How Price Feeds Get Manipulated</title>
    <link>https://crypto.training/blog/2026-02-01-oracles-and-twap/</link>
    <guid>https://crypto.training/blog/2026-02-01-oracles-and-twap/</guid>
    <pubDate>Sun, 01 Feb 2026 00:00:00 GMT</pubDate>
    <description>Oracles are an interface between economics and code. If you integrate a price, you must model who can move it, how fast, and at what cost.</description>
  </item>
  
  <item>
    <title>Ethereum Is a Dark Forest: MEV Threat Models for Protocol Engineers</title>
    <link>https://crypto.training/blog/2026-01-29-ethereum-dark-forest-mev/</link>
    <guid>https://crypto.training/blog/2026-01-29-ethereum-dark-forest-mev/</guid>
    <pubDate>Thu, 29 Jan 2026 00:00:00 GMT</pubDate>
    <description>Assume adversaries see your transaction before it lands and can reorder around it. This is the starting point for MEV-safe protocol design.</description>
  </item>
  
  <item>
    <title>Bridges Threat Model: Message Passing, Trust Assumptions, and How Things Break</title>
    <link>https://crypto.training/blog/2026-01-26-bridges-threat-model/</link>
    <guid>https://crypto.training/blog/2026-01-26-bridges-threat-model/</guid>
    <pubDate>Mon, 26 Jan 2026 00:00:00 GMT</pubDate>
    <description>Bridges fail at the boundary between chains: verification, finality, replay, and liveness. Treat bridges as protocols with their own consensus.</description>
  </item>
  
  <item>
    <title>Reentrancy Beyond the Basics: Cross-Function, Cross-Contract, and Read-Only</title>
    <link>https://crypto.training/blog/2026-01-23-reentrancy-beyond-the-basics/</link>
    <guid>https://crypto.training/blog/2026-01-23-reentrancy-beyond-the-basics/</guid>
    <pubDate>Fri, 23 Jan 2026 00:00:00 GMT</pubDate>
    <description>Reentrancy is not just &apos;send ETH then update state&apos;. It’s any time external code can observe or mutate your state mid-invariant.</description>
  </item>
  
  <item>
    <title>Signatures in Solidity: EIP-712, Replay Attacks, and Permit Front-Run DoS</title>
    <link>https://crypto.training/blog/2026-01-20-signatures-eip712-permit/</link>
    <guid>https://crypto.training/blog/2026-01-20-signatures-eip712-permit/</guid>
    <pubDate>Tue, 20 Jan 2026 00:00:00 GMT</pubDate>
    <description>Signatures move authorization off-chain. The bugs are subtle: replay across domains, nonce misuse, and integrations that assume permit always succeeds.</description>
  </item>
  
  <item>
    <title>Solidity Storage Layout: Slots, Packing, and the Bugs It Enables</title>
    <link>https://crypto.training/blog/2026-01-14-solidity-storage-layout/</link>
    <guid>https://crypto.training/blog/2026-01-14-solidity-storage-layout/</guid>
    <pubDate>Wed, 14 Jan 2026 00:00:00 GMT</pubDate>
    <description>Storage is where Solidity hides complexity. If you can reason about slots, you can reason about upgrade safety, state corruption, and exploit primitives.</description>
  </item>
  
  <item>
    <title>Invariant-First Auditing: Closing the 40% Gap in Automated Coverage</title>
    <link>https://crypto.training/blog/2026-01-08-invariant-first-auditing/</link>
    <guid>https://crypto.training/blog/2026-01-08-invariant-first-auditing/</guid>
    <pubDate>Thu, 08 Jan 2026 00:00:00 GMT</pubDate>
    <description>Static checks and fuzzing are necessary but insufficient. Invariant-first auditing makes protocol safety properties explicit and testable across long adversarial sequences.</description>
  </item>
  
  <item>
    <title>Metamorphic Contracts Across Chains: CREATE2 Trust Breaks in Practice</title>
    <link>https://crypto.training/blog/2026-01-07-metamorphic-contracts-cross-chain/</link>
    <guid>https://crypto.training/blog/2026-01-07-metamorphic-contracts-cross-chain/</guid>
    <pubDate>Wed, 07 Jan 2026 00:00:00 GMT</pubDate>
    <description>Address-based trust assumptions fail when runtime code can change behind the same address on chains with divergent SELFDESTRUCT semantics.</description>
  </item>
  
  <item>
    <title>Liquidation as a Security Property: Fairness, Liveness, and Solvency</title>
    <link>https://crypto.training/blog/2026-01-06-liquidation-as-security-property/</link>
    <guid>https://crypto.training/blog/2026-01-06-liquidation-as-security-property/</guid>
    <pubDate>Tue, 06 Jan 2026 00:00:00 GMT</pubDate>
    <description>Liquidation logic is often treated as pure economics. In practice, it is a security boundary where liveness failures and asymmetry bugs convert stress into protocol loss.</description>
  </item>
  
  <item>
    <title>Mellow Flexible Vaults: Architecture, Workflows, and Security Model</title>
    <link>https://crypto.training/blog/2026-01-05-mellow-architecture-and-workflows/</link>
    <guid>https://crypto.training/blog/2026-01-05-mellow-architecture-and-workflows/</guid>
    <pubDate>Mon, 05 Jan 2026 00:00:00 GMT</pubDate>
    <description>A code-level deep dive into Mellow Flexible Vaults: core modules, queue-driven fund flows, curator execution, oracle reporting, and security boundaries.</description>
  </item>
  
  <item>
    <title>Adversarial Token Integration: Why ERC-20 Compatibility Is Not a Security Model</title>
    <link>https://crypto.training/blog/2026-01-02-adversarial-token-integration/</link>
    <guid>https://crypto.training/blog/2026-01-02-adversarial-token-integration/</guid>
    <pubDate>Fri, 02 Jan 2026 00:00:00 GMT</pubDate>
    <description>Most token integrations assume transfer amount fidelity and standard return behavior. Production incidents show the opposite: token behavior is adversarial from the integrator’s perspective.</description>
  </item>
  
  <item>
    <title>ERC-4337 Auditor Threat Model: Bundles, Paymasters, and Signature Boundaries</title>
    <link>https://crypto.training/blog/2026-01-01-erc4337-auditor-threat-model/</link>
    <guid>https://crypto.training/blog/2026-01-01-erc4337-auditor-threat-model/</guid>
    <pubDate>Thu, 01 Jan 2026 00:00:00 GMT</pubDate>
    <description>Account abstraction audits fail when they treat UserOperation validation as a normal transfer flow. This post maps the real trust boundaries for EntryPoint systems.</description>
  </item>
  
  <item>
    <title>Signing Infrastructure Threat Model: Why Correct Crypto Still Loses Funds</title>
    <link>https://crypto.training/blog/2025-12-31-signing-infrastructure-threat-model/</link>
    <guid>https://crypto.training/blog/2025-12-31-signing-infrastructure-threat-model/</guid>
    <pubDate>Wed, 31 Dec 2025 00:00:00 GMT</pubDate>
    <description>Most major losses now happen above the cryptographic primitive layer. This post maps where signing pipelines fail and how to harden them end-to-end.</description>
  </item>
  
  <item>
    <title>L2 Oracle Failure Modes: Sequencer Risk, Stale Feeds, and Liquidation Drift</title>
    <link>https://crypto.training/blog/2025-12-30-l2-oracle-failure-modes/</link>
    <guid>https://crypto.training/blog/2025-12-30-l2-oracle-failure-modes/</guid>
    <pubDate>Tue, 30 Dec 2025 00:00:00 GMT</pubDate>
    <description>On L2s, oracle correctness is not only about data source quality. Sequencer liveness, update lag, and fallback design can convert good feeds into bad liquidations.</description>
  </item>
  
  <item>
    <title>Reentrancy in 2026: Callback Surfaces You Still Miss</title>
    <link>https://crypto.training/blog/2025-12-29-reentrancy-2026-callback-surfaces/</link>
    <guid>https://crypto.training/blog/2025-12-29-reentrancy-2026-callback-surfaces/</guid>
    <pubDate>Mon, 29 Dec 2025 00:00:00 GMT</pubDate>
    <description>Reentrancy is not just withdraw-before-update. Token standard callbacks, cross-function paths, and read-only windows still create severe failures.</description>
  </item>
  
  <item>
    <title>Deployment-Layer Security: CPIMP and the Proxy Initialization Race</title>
    <link>https://crypto.training/blog/2025-12-28-deployment-layer-security-cpimp/</link>
    <guid>https://crypto.training/blog/2025-12-28-deployment-layer-security-cpimp/</guid>
    <pubDate>Sun, 28 Dec 2025 00:00:00 GMT</pubDate>
    <description>Many teams secure implementation code and still lose funds during deployment. This post maps the proxy deploy-init race, CPIMP persistence techniques, and practical hardening.</description>
  </item>
  
  <item>
    <title>Compositional Rounding Attacks: When Safe Math Becomes Unsafe</title>
    <link>https://crypto.training/blog/2025-12-27-compositional-rounding-attacks/</link>
    <guid>https://crypto.training/blog/2025-12-27-compositional-rounding-attacks/</guid>
    <pubDate>Sat, 27 Dec 2025 00:00:00 GMT</pubDate>
    <description>Rounding bugs are usually not single-line bugs. They emerge when multiple safe-looking operations compose into a leak loop. This post shows how to model, test, and patch that class of failures.</description>
  </item>
  
  <item>
    <title>Mellow Verifier vs Zodiac Roles Modifier: Curator Calldata Checks</title>
    <link>https://crypto.training/blog/2025-12-26-mellow-vs-roles-curator-calldata-checks/</link>
    <guid>https://crypto.training/blog/2025-12-26-mellow-vs-roles-curator-calldata-checks/</guid>
    <pubDate>Fri, 26 Dec 2025 00:00:00 GMT</pubDate>
    <description>A code-level comparison of how Mellow Flexible Vaults and Zodiac Roles Modifier authorize curator transactions: allowlists, calldata constraints, allowances, adapters, and failure semantics.</description>
  </item>
  
  <item>
    <title>Veda vs Mellow: Architecture, Fund Flows, and Security Tradeoffs</title>
    <link>https://crypto.training/blog/2025-12-22-veda-vs-mellow/</link>
    <guid>https://crypto.training/blog/2025-12-22-veda-vs-mellow/</guid>
    <pubDate>Mon, 22 Dec 2025 00:00:00 GMT</pubDate>
    <description>A code-level comparison of Veda BoringVault and Mellow Flexible Vaults: module boundaries, async flows, curator calldata controls, oracle models, and security assumptions.</description>
  </item>
  
  <item>
    <title>ERC-7540 in Practice: Standards, Implementations, Security Pitfalls, and Alternatives</title>
    <link>https://crypto.training/blog/2025-12-14-erc-7540/</link>
    <guid>https://crypto.training/blog/2025-12-14-erc-7540/</guid>
    <pubDate>Sun, 14 Dec 2025 00:00:00 GMT</pubDate>
    <description>A code-first analysis of ERC-7540, ERC-7575, and ERC-7887: what the standards require, how production systems actually implement async flows, where designs diverge, recurring vulnerability patterns, and how Mellow compares as an async vault architecture outside strict ERC-7540.</description>
  </item>
  
  <item>
    <title>Fluid Deep Dive: DEX v2 Architecture, Money Market Flows, and Security Threat Models</title>
    <link>https://crypto.training/blog/2025-11-09-fluid/</link>
    <guid>https://crypto.training/blog/2025-11-09-fluid/</guid>
    <pubDate>Sun, 09 Nov 2025 00:00:00 GMT</pubDate>
    <description>A code-informed, security-first walkthrough of Fluid&apos;s Liquidity Layer, DEX v2 (D3/D4), and Money Market: architecture, user stories, fund flows, invariants, and vulnerability hunting playbooks.</description>
  </item>
  
  <item>
    <title>Kiln DeFi: Architecture, User Flows, and Security Boundaries</title>
    <link>https://crypto.training/blog/2025-10-04-kiln-defi/</link>
    <guid>https://crypto.training/blog/2025-10-04-kiln-defi/</guid>
    <pubDate>Sat, 04 Oct 2025 00:00:00 GMT</pubDate>
    <description>A code-level breakdown of Kiln DeFi vault architecture, connector model, fund flows, user deposit and withdrawal journeys, role/governance controls, and practical risk analysis.</description>
  </item>
  
  <item>
    <title>Safe Smart Account Evolution: v1.0.0 to v1.5.0, Feature Growth vs Security Surface</title>
    <link>https://crypto.training/blog/2025-09-23-safe-evolution/</link>
    <guid>https://crypto.training/blog/2025-09-23-safe-evolution/</guid>
    <pubDate>Tue, 23 Sep 2025 00:00:00 GMT</pubDate>
    <description>A deep, code-first analysis of Safe version evolution from v1.0.0 to v1.5.0: what changed, why it changed, what risks were introduced, and how audits and fixes shifted the security posture over time.</description>
  </item>
  
  <item>
    <title>ECDSA in Plain English: How secp256k1 Turns a Secret Number Into a Public Key</title>
    <link>https://crypto.training/blog/2025-09-08-ecdsa/</link>
    <guid>https://crypto.training/blog/2025-09-08-ecdsa/</guid>
    <pubDate>Mon, 08 Sep 2025 00:00:00 GMT</pubDate>
    <description>A beginner-friendly walkthrough of ECDSA on secp256k1: private key, public key, signing, verification, and why it is one-way. Includes animated visuals for point multiplication.</description>
  </item>
</channel>
</rss>
