{"id":"8d080bb1-726d-4ed4-b03c-33715c112502","timestamp":1775471599888,"matcher":{"static":{"/":{"prerender":true},"/blog":{"prerender":true},"/contact":{"prerender":true},"/reports":{"redirect":"https://ottersec.notion.site/Sampled-Public-Audit-Reports-a296e98838aa4fdb8f3b192663400772"}},"wildcard":{},"dynamic":{}},"prerendered":["/blog/2023-07-28-solidity-compilers-memory-safety","/blog/2023-08-01-vyper-timeline","/blog/2022-04-26-spl-swap-rounding","/blog/2022-09-16-move-prover","/blog/2023-12-11-jumping-around-in-the-vm","/blog/2022-02-16-lp-token-oracle-manipulation","/blog/2022-12-09-rust-realloc-and-references","/blog/2023-08-11-web2-bug-repellant-instructions","/blog/2022-08-27-reverse-engineering-solana","/blog/2024-01-18-rounding-bugs","/blog/2022-09-06-move-introduction","/blog/2022-08-19-solend-rent-thief","/blog/2024-06-10-supply-chain-attacks-a-new-era","/blog/2023-11-01-metamask-snaps","/blog/2022-03-14-solana-security-intro","/blog/2025-03-07-subverting-web2-authentication-in-web3","/blog/2025-02-22-multisig-security","/blog/2023-01-26-formally-verifying-solana-programs","/blog/2025-08-11-compiler-bug-causes-compiler-bug","/blog/2024-11-25-netfilter-universal-root-1-day","/blog/2025-05-14-king-of-the-sol","/blog/2025-10-16-how-we-broke-exchanges-oauth-misconfigurations","/blog/2025-09-13-how-to-survive-supply-chain-attacks","/blog/2026-03-17-virtio-snd-qemu-hypervisor-escape","/blog/2025-08-27-how-proof-of-reserves-uses-zk-to-protect-your-funds","/blog/2025-12-02-paymasters-evm","/blog/2025-06-10-cosmos-security","/blog/2026-03-03-zkvms-unfaithful-claims","/blog/2026-04-01-patch-gap-to-mobile-renderer-rce","/blog/2025-02-10-hitchhikers-guide-to-aptos-fungible-assets"]}