ExVul Research

Security Research & Analysis

Deep technical analysis of blockchain vulnerabilities, exploit breakdowns, and cutting-edge security research from our expert team.

25+

Research Papers

100+

Vulnerabilities Analyzed

8+

Chains Covered

All Research

Chrome Extension Wallet Ciphertext Replacement Attack
Research
May 20248 min

Chrome Extension Wallet Ciphertext Replacement Attack

Many chrome extension wallets use indexedDB to store encryption key data, but there exists a cipher text replacement attack that can steal user's private keys or mnemonic phrases.

Wallet SecurityChrome Extension
Read
Prediction Markets Are Becoming Financial Infrastructure. Their Security Is Not Ready.
Research
June 202512 min

Prediction Markets Are Becoming Financial Infrastructure. Their Security Is Not Ready.

The numbers back this up. During the 2024 U.S. election, prediction markets saw unprecedented volume and mainstream adoption, yet their security infrastructure remains immature.

PolymarketPrediction Markets
Read
Nemo Protocol Hack: $150K Loss Analysis on Sui Blockchain
Research
May 202510 min

Nemo Protocol Hack: $150K Loss Analysis on Sui Blockchain

Detailed breakdown of the Nemo Protocol exploit on Sui blockchain, examining the vulnerability and attack methodology.

SuiHack Analysis
Read
TON Blockchain: Tolk vs FunC Security Comparison
Research
April 202514 min

TON Blockchain: Tolk vs FunC Security Comparison

Comprehensive security analysis comparing TON's new Tolk language with the established FunC for smart contract development.

TONTolk
Read
Radiant Capital Hack: $58M Cross-Chain Attack Analysis
Research
March 202515 min

Radiant Capital Hack: $58M Cross-Chain Attack Analysis

In-depth analysis of the Radiant Capital exploit that resulted in $58 million in losses across multiple chains.

RadiantCross-chain
Read
Stacks Clarity Smart Contract Security Guide
Research
February 202518 min

Stacks Clarity Smart Contract Security Guide

Comprehensive security guide for developing secure smart contracts using Clarity on the Stacks blockchain.

StacksClarity
Read
DeFi Oracle Manipulation: Attack Patterns and Defenses
Research
January 202513 min

DeFi Oracle Manipulation: Attack Patterns and Defenses

Analysis of oracle manipulation attacks in DeFi protocols and recommended defensive measures.

OracleDeFi
Read
Move Language Security: Aptos vs Sui Implementation Differences
Research
December 202416 min

Move Language Security: Aptos vs Sui Implementation Differences

Comparative analysis of Move language security considerations between Aptos and Sui blockchains.

MoveAptos
Read
ZK-Rollup Security: Current Landscape and Risks
Research
November 202414 min

ZK-Rollup Security: Current Landscape and Risks

Security analysis of zero-knowledge rollup implementations and their trust assumptions.

ZK-RollupLayer 2
Read
MEV Protection Strategies for DeFi Protocols
Research
October 202411 min

MEV Protection Strategies for DeFi Protocols

Comprehensive guide to protecting DeFi protocols and users from Maximal Extractable Value attacks.

MEVFront-running
Read
Account Abstraction Security: ERC-4337 Risks and Mitigations
Research
September 202412 min

Account Abstraction Security: ERC-4337 Risks and Mitigations

Security analysis of ERC-4337 account abstraction and potential vulnerabilities in smart contract wallets.

ERC-4337Account Abstraction
Read
Cosmos IBC Security: Cross-Chain Communication Risks
Research
August 202413 min

Cosmos IBC Security: Cross-Chain Communication Risks

Analysis of Inter-Blockchain Communication (IBC) security in the Cosmos ecosystem.

CosmosIBC
Read
Restaking Security: EigenLayer and AVS Risks
Research
July 202415 min

Restaking Security: EigenLayer and AVS Risks

Security analysis of restaking protocols like EigenLayer and the risks of Actively Validated Services.

EigenLayerRestaking
Read
Research Updates

Get the Latest Security Research

Subscribe to receive our latest vulnerability analysis, security research papers, and technical deep-dives.

New vulnerability disclosures
Technical research papers
Exploit analysis and breakdowns

Subscribe to Research

No spam, unsubscribe anytime.