<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
  <title>NullRabbit Research Hub</title>
  <link href="https://nullrabbit.ai/research"/>
  <link href="https://nullrabbit.ai/research/atom.xml" rel="self"/>
  <id>https://nullrabbit.ai/research</id>
  <updated>2026-04-15T20:38:11.699Z</updated>
  <subtitle>Research insights on DePIN security, blockchain infrastructure, and decentralized network protection</subtitle>
  <logo>https://nullrabbit.ai/twitter.png</logo>
  <rights>© 2025 NullRabbit. All rights reserved.</rights>
  <entry>
    <title>We Scanned 5,700 [Solana, Eth, Sui, Atom] Validators. Here&#39;s What We Found.</title>
    <link href="https://nullrabbit.ai/research/validator-scan-findings-solana-sui-april-2026"/>
    <id>https://nullrabbit.ai/research/validator-scan-findings-solana-sui-april-2026</id>
    <updated>2026-04-14T00:00:00.000Z</updated>
    <published>2026-04-14T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>NullRabbit scanned 5,715 validator hosts across Solana and Sui, running 10,139 scans and identifying 1,340 CVE findings across 155 hosts. Here&#39;s what the validator attack surface actually looks like.</summary>
    <category term="slashr"/>
    <category term="solana"/>
    <category term="sui"/>
    <category term="scanning"/>
    <category term="security"/>
    <category term="validators"/>
    <category term="CVE"/>
    <category term="infrastructure"/>
  </entry>
  <entry>
    <title>Slashr: Real-Time Validator Incident Tracking Across Four Networks</title>
    <link href="https://nullrabbit.ai/research/slashr-features"/>
    <id>https://nullrabbit.ai/research/slashr-features</id>
    <updated>2026-04-06T00:00:00.000Z</updated>
    <published>2026-04-06T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>Slashr tracks validator delinquency, jailing, slashing, and missed votes across Solana, Ethereum, Sui, and Cosmos in real time. Wallet checks, rankings, automated scanning, and reliability reports -- all from on-chain data.</summary>
    <category term="slashr"/>
    <category term="solana"/>
    <category term="ethereum"/>
    <category term="sui"/>
    <category term="cosmos"/>
    <category term="scanning"/>
    <category term="monitoring"/>
    <category term="rankings"/>
    <category term="validators"/>
  </entry>
  <entry>
    <title>Connecting Slashr to Your AI Workflow via MCP</title>
    <link href="https://nullrabbit.ai/research/slashr-mcp"/>
    <id>https://nullrabbit.ai/research/slashr-mcp</id>
    <updated>2026-04-05T00:00:00.000Z</updated>
    <published>2026-04-05T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>Slashr now has a Model Context Protocol server. Any MCP-compatible AI tool -- Claude Code, Claude Desktop, or custom agents -- can query live validator incident data, scan results, and network summaries directly.</summary>
    <category term="slashr"/>
    <category term="mcp"/>
    <category term="ai"/>
    <category term="claude"/>
    <category term="validators"/>
    <category term="solana"/>
    <category term="ethereum"/>
    <category term="sui"/>
    <category term="cosmos"/>
    <category term="api"/>
  </entry>
  <entry>
    <title>Introducing Slashr: A Live Feed of Every Validator Incident</title>
    <link href="https://nullrabbit.ai/research/introducing-slashr"/>
    <id>https://nullrabbit.ai/research/introducing-slashr</id>
    <updated>2026-03-26T00:00:00.000Z</updated>
    <published>2026-03-26T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>Validators go down constantly. Almost nobody is watching it happen in real time, across chains, in one place. So we built slashr.dev, a live incident feed tracking Solana, Ethereum, Sui, and Cosmos.</summary>
    <category term="solana"/>
    <category term="ethereum"/>
    <category term="sui"/>
    <category term="cosmos"/>
    <category term="validators"/>
    <category term="monitoring"/>
    <category term="incidents"/>
    <category term="slashing"/>
    <category term="infrastructure-security"/>
  </entry>
  <entry>
    <title>DeFi Under the Microscope: 1,075 Hosts, 3,001 Ports, One Timing Scan</title>
    <link href="https://nullrabbit.ai/research/defi-under-the-microscope"/>
    <id>https://nullrabbit.ai/research/defi-under-the-microscope</id>
    <updated>2026-03-25T00:00:00.000Z</updated>
    <published>2026-03-25T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>A first look at what DeFi validator infrastructure looks like at the kernel level. We crack open the consolidated dataset -- embedding galaxies, jitter fingerprints, RTT ridgelines, and 10,000 anomaly events across 642 silent hosts.</summary>
    <category term="sui"/>
    <category term="solana"/>
    <category term="scanning"/>
    <category term="timing"/>
    <category term="ebpf"/>
    <category term="xdp"/>
    <category term="validators"/>
    <category term="honeypots"/>
    <category term="anomaly-detection"/>
    <category term="infrastructure-security"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>What Does a DeFi Network Actually Look Like?</title>
    <link href="https://nullrabbit.ai/research/what-does-a-defi-network-look-like"/>
    <id>https://nullrabbit.ai/research/what-does-a-defi-network-look-like</id>
    <updated>2026-03-20T00:00:00.000Z</updated>
    <published>2026-03-20T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>Every blockchain network has a physical fingerprint. We pointed our eBPF/XDP scanner at 1,075 hosts across multiple DeFi validator networks and mapped 3,001 timing fingerprints to reveal the structure underneath the consensus layer.</summary>
    <category term="sui"/>
    <category term="solana"/>
    <category term="scanning"/>
    <category term="timing"/>
    <category term="ebpf"/>
    <category term="xdp"/>
    <category term="validators"/>
    <category term="infrastructure-security"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>The Kernel Doesn&#39;t Care About Your Restart Script</title>
    <link href="https://nullrabbit.ai/research/bpf-xdp-production-challenges"/>
    <id>https://nullrabbit.ai/research/bpf-xdp-production-challenges</id>
    <updated>2026-03-18T00:00:00.000Z</updated>
    <published>2026-03-18T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>Building a production BPF/XDP scanner is an exercise in humility. Orphaned XDP programs, async Rust deadlocks, stale binaries, silent TC failures -- here is everything that broke and what we did about it.</summary>
    <category term="ebpf"/>
    <category term="xdp"/>
    <category term="scanning"/>
    <category term="infrastructure"/>
    <category term="rust"/>
    <category term="production"/>
    <category term="engineering"/>
  </entry>
  <entry>
    <title>What We Found Scanning the Sui Validator Network</title>
    <link href="https://nullrabbit.ai/research/sui-validator-network-exposure"/>
    <id>https://nullrabbit.ai/research/sui-validator-network-exposure</id>
    <updated>2026-03-13T00:00:00.000Z</updated>
    <published>2026-03-13T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>We scanned 138 Sui validators across 20 countries using kernel-level temporal fingerprinting. 41% have SSH exposed, 57 run unexpected internet-facing services, and 9 confirmed CVEs sit on 4 hosts -- including 2 critical at CVSS 9.8. Here is what we found and why it matters for DeFi.</summary>
    <category term="sui"/>
    <category term="scanning"/>
    <category term="exposure"/>
    <category term="validators"/>
    <category term="ebpf"/>
    <category term="xdp"/>
    <category term="earned-autonomy"/>
    <category term="infrastructure-security"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Open-Sourcing Our Autonomous Defence Arsenal: Here&#39;s What&#39;s Inside</title>
    <link href="https://nullrabbit.ai/research/open-sourcing-autonomous-defence-arsenal"/>
    <id>https://nullrabbit.ai/research/open-sourcing-autonomous-defence-arsenal</id>
    <updated>2026-02-26T00:00:00.000Z</updated>
    <published>2026-02-26T00:00:00.000Z</published>
    <author>
      <name>Simon</name>
    </author>
    <summary>We&#39;re open-sourcing the tooling behind NullRabbit&#39;s autonomous kernel-level network defence: the scanning, intelligence, observation, and adversarial validation layers that feed our enforcement pipeline. Six tools, MIT licensed, with more coming.</summary>
    <category term="open-source"/>
    <category term="scanning"/>
    <category term="ebpf"/>
    <category term="xdp"/>
    <category term="honeypot-detection"/>
    <category term="osint"/>
    <category term="earned-autonomy"/>
    <category term="infrastructure-security"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Why Autonomous Enforcement Must Earn Authority</title>
    <link href="https://nullrabbit.ai/research/why-autonomous-enforcement-must-earn-authority"/>
    <id>https://nullrabbit.ai/research/why-autonomous-enforcement-must-earn-authority</id>
    <updated>2026-02-13T00:00:00.000Z</updated>
    <published>2026-02-13T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>The technology to defend networks autonomously exists. The legitimacy to deploy it does not. Introducing earned autonomy: a governance framework where defensive authority is demonstrated before granted, scoped per abuse class, and continuously re-earned or revoked.</summary>
    <category term="earned-autonomy"/>
    <category term="infrastructure-security"/>
    <category term="inline-defense"/>
    <category term="autonomous-enforcement"/>
    <category term="ibsr"/>
    <category term="guard"/>
    <category term="governance"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Building the Jig (Again): Claiming the Time Dimension</title>
    <link href="https://nullrabbit.ai/research/building-the-jig-claiming-the-time-dimension"/>
    <id>https://nullrabbit.ai/research/building-the-jig-claiming-the-time-dimension</id>
    <updated>2026-02-05T00:00:00.000Z</updated>
    <published>2026-02-05T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>Inline defence without understanding is guesswork. Before machines act, they need evidence. Why we&#39;re open-sourcing our scanning system, building jigs instead of shortcuts, and claiming time as a first-class signal in infrastructure security.</summary>
    <category term="earned-autonomy"/>
    <category term="infrastructure-security"/>
    <category term="inline-defense"/>
    <category term="temporal-signals"/>
    <category term="temporal-resonance-scanning"/>
    <category term="orca"/>
    <category term="guard"/>
    <category term="open-source"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Earned Autonomy: The Paper</title>
    <link href="https://nullrabbit.ai/research/earned-autonomy-paper"/>
    <id>https://nullrabbit.ai/research/earned-autonomy-paper</id>
    <updated>2026-01-28T00:00:00.000Z</updated>
    <published>2026-01-28T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>Machines attack at machine speed. Humans defend at human speed. The technology to close this gap exists - the governance doesn&#39;t. A framework for when machines should be permitted to act without human approval.</summary>
    <category term="earned-autonomy"/>
    <category term="autonomous-defense"/>
    <category term="governance"/>
    <category term="infrastructure-security"/>
    <category term="kernel-security"/>
    <category term="ibsr"/>
    <category term="guard"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Validating Inline Enforcement with XDP: IBSR and the Path to Earned Autonomy</title>
    <link href="https://nullrabbit.ai/research/validating-inline-enforcement-with-xdp"/>
    <id>https://nullrabbit.ai/research/validating-inline-enforcement-with-xdp</id>
    <updated>2026-01-21T00:00:00.000Z</updated>
    <published>2026-01-21T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>Inline enforcement operates at machine speed, but trust cannot. IBSR is a validation step: using XDP to observe real traffic, simulate enforcement, and generate evidence before any blocking is enabled.</summary>
    <category term="earned-autonomy"/>
    <category term="ibsr"/>
    <category term="guard"/>
    <category term="xdp"/>
    <category term="inline-enforcement"/>
    <category term="kernel-security"/>
    <category term="infrastructure-security"/>
    <category term="governance"/>
  </entry>
  <entry>
    <title>On Earned Autonomy: When Should Machines Defend Networks Without Asking?</title>
    <link href="https://nullrabbit.ai/research/on-earned-autonomy"/>
    <id>https://nullrabbit.ai/research/on-earned-autonomy</id>
    <updated>2026-01-13T00:00:00.000Z</updated>
    <published>2026-01-13T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>Machines attack at machine speed. Humans defend at human speed. We propose a governance framework for closing that gap--not through blind trust, but through demonstrated competence.</summary>
    <category term="earned-autonomy"/>
    <category term="ibsr"/>
    <category term="guard"/>
    <category term="xdp"/>
    <category term="autonomous-defence"/>
    <category term="governance"/>
    <category term="zero-day"/>
    <category term="kernel-security"/>
  </entry>
  <entry>
    <title>Building the Jig: Why the Hard Part of Inline Defence Isn&#39;t the Code</title>
    <link href="https://nullrabbit.ai/research/building-the-jig-inline-defence-testing"/>
    <id>https://nullrabbit.ai/research/building-the-jig-inline-defence-testing</id>
    <updated>2025-12-18T00:00:00.000Z</updated>
    <published>2025-12-18T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>The XDP logic came together in days. The infrastructure to prove it works took weeks. That ratio matters more than most people realise.</summary>
    <category term="xdp"/>
    <category term="testing"/>
    <category term="infrastructure"/>
    <category term="kernel-security"/>
    <category term="inline-defence"/>
    <category term="devops"/>
    <category term="terraform"/>
  </entry>
  <entry>
    <title>How Solana Shrugged Off a 6 Tbps DDoS</title>
    <link href="https://nullrabbit.ai/research/solana-ddos-guard-inline-defence"/>
    <id>https://nullrabbit.ai/research/solana-ddos-guard-inline-defence</id>
    <updated>2025-12-17T00:00:00.000Z</updated>
    <published>2025-12-17T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Research</name>
    </author>
    <summary>Solana reportedly absorbed a sustained ~6 Tbps volumetric DDoS attack with no downtime. That&#39;s real progress. It&#39;s also not the same thing as being protected.</summary>
    <category term="solana"/>
    <category term="ddos"/>
    <category term="xdp"/>
    <category term="inline-defence"/>
    <category term="kernel-security"/>
    <category term="validators"/>
    <category term="infrastructure"/>
  </entry>
  <entry>
    <title>Cloudflare Can&#39;t Save You From a DoS (I Checked)</title>
    <link href="https://nullrabbit.ai/research/cloudflare-dos-limitations"/>
    <id>https://nullrabbit.ai/research/cloudflare-dos-limitations</id>
    <updated>2025-12-16T00:00:00.000Z</updated>
    <published>2025-12-16T00:00:00.000Z</published>
    <author>
      <name>Simon Morley</name>
    </author>
    <summary>I assumed Cloudflare would protect me from all denial-of-service attacks. It doesn&#39;t. A reality check on origin IP bypasses, non-HTTP floods, and why the gap between the edge and your kernel matters.</summary>
    <category term="cloudflare"/>
    <category term="dos-protection"/>
    <category term="xdp"/>
    <category term="kernel-security"/>
    <category term="infrastructure"/>
    <category term="decentralization"/>
  </entry>
  <entry>
    <title>XDP Defence with MQTT: Real-Time Detection Pipeline</title>
    <link href="https://nullrabbit.ai/research/xdp-defence-mqtt"/>
    <id>https://nullrabbit.ai/research/xdp-defence-mqtt</id>
    <updated>2025-12-02T00:00:00.000Z</updated>
    <published>2025-12-02T00:00:00.000Z</published>
    <author>
      <name>Simon Morley</name>
    </author>
    <summary>Demonstrating the complete XDP detection pipeline with MQTT eventing. Shows kernel-level SYN-flood detection, userspace processing, and real-time remote alerting - all in milliseconds.</summary>
    <category term="xdp"/>
    <category term="mqtt"/>
    <category term="detection-pipeline"/>
    <category term="kernel-security"/>
    <category term="real-time"/>
    <category term="syn-flood"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>XDP Inline Defense for Validators: Kernel-Level Protection at Line Rate</title>
    <link href="https://nullrabbit.ai/research/xdp-inline-defense-for-validators"/>
    <id>https://nullrabbit.ai/research/xdp-inline-defense-for-validators</id>
    <updated>2025-11-19T00:00:00.000Z</updated>
    <published>2025-11-19T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Labs</name>
    </author>
    <summary>Validator nodes face constant exposure. This deep dive explains how NullRabbit Guard uses eBPF and XDP to enforce security directly inside the NIC driver, dropping scans and abnormal traffic at line rate before they reach the kernel or your node.</summary>
    <category term="validators"/>
    <category term="security"/>
    <category term="xdp"/>
    <category term="ebpf"/>
    <category term="depin"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Sui Validator Security Benchmark - September 2025</title>
    <link href="https://nullrabbit.ai/research/2025-09-research-sui"/>
    <id>https://nullrabbit.ai/research/2025-09-research-sui</id>
    <updated>2025-09-24T00:00:00.000Z</updated>
    <published>2025-09-24T00:00:00.000Z</published>
    <author>
      <name>Simon Morley</name>
    </author>
    <summary>NullRabbit&#39;s September 2025 benchmark provides a consolidated security snapshot of all Sui validators. Scores ranged from 15 to 93, with a median of 45, and 18.5% meeting our good practice threshold. This dataset and heatmap give validators tools to improve, while offering delegators transparency when choosing staking providers.</summary>
    <category term="sui"/>
    <category term="validators"/>
    <category term="cves"/>
    <category term="misconfigurations"/>
    <category term="systemic-risk"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Validator Slashing Incidents Are a Warning. Sui Could Be Next.</title>
    <link href="https://nullrabbit.ai/research/sui-validator-slashing-warning"/>
    <id>https://nullrabbit.ai/research/sui-validator-slashing-warning</id>
    <updated>2025-09-12T00:00:00.000Z</updated>
    <published>2025-09-12T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Team</name>
    </author>
    <summary>Recent Ethereum validator slashings showed how fragile infra can be. Our scan of Sui uncovered something worse: nearly 40% of validator voting power exposed.</summary>
    <category term="sui"/>
    <category term="defi"/>
    <category term="validators"/>
    <category term="security"/>
    <category term="systemic-risk"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Sui Validator Network Exposed: Nearly 40% at Risk</title>
    <link href="https://nullrabbit.ai/research/sui-validator-network-exposed"/>
    <id>https://nullrabbit.ai/research/sui-validator-network-exposed</id>
    <updated>2025-09-02T00:00:00.000Z</updated>
    <published>2025-09-02T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Team</name>
    </author>
    <summary>NullRabbit&#39;s August 2025 scan of the Sui validator set revealed nearly 40% of voting power exposed to SSH, CVEs, and misconfigurations - leaving the network one step away from consensus failure.</summary>
    <category term="sui"/>
    <category term="validators"/>
    <category term="security"/>
    <category term="cves"/>
    <category term="opsec"/>
    <category term="research"/>
  </entry>
  <entry>
    <title>Welcome to NullRabbit Research Hub</title>
    <link href="https://nullrabbit.ai/research/welcome-to-research-hub"/>
    <id>https://nullrabbit.ai/research/welcome-to-research-hub</id>
    <updated>2025-09-01T00:00:00.000Z</updated>
    <published>2025-09-01T00:00:00.000Z</published>
    <author>
      <name>NullRabbit Team</name>
    </author>
    <summary>Introducing our new research hub where we share insights on DePIN security, blockchain infrastructure, and decentralized network protection.</summary>
    <category term="announcement"/>
    <category term="research"/>
    <category term="depin"/>
    <category term="security"/>
  </entry>
</feed>