
Featured Post
Subverting Web2 Authentication in Web3
Web3 authentication uses cryptographic signatures and wallets, but Web2 auth integrations can introduce hidden risks. We explore vulnerabilities like OAuth logic exploits, Supabase misconfigurations, and OAuth abuse in localhost setups.
Read More
Security exploits, tutorials, and findings