nabilech.com

Uncategorized

Understanding Zero-Knowledge Proofs Through the Lens of P vs NP

1. Introduction — The Hidden Thread Between Math and Privacy If you’re reading this, chances are you’ve used encryption today — probably without realizing it. Every time you send a message, check your email, or make a blockchain transaction, your data is protected by math. But not just any math — it’s protected by problems […]

Understanding Zero-Knowledge Proofs Through the Lens of P vs NP Read More »

ResupplyFi Rekt: How a $4K Flash Loan Led to a $9.8M ERC-4626 Donation Attack

1. Introduction In June 2025, ResupplyFi — a lending protocol integrated with the Convex and Yearn ecosystems — suffered a devastating exploit that drained approximately $9.8 million in under 90 minutes. The attacker leveraged a classic ERC-4626 “donation attack” combined with a flawed vault implementation to manipulate the exchange rate of vault shares, turning a

ResupplyFi Rekt: How a $4K Flash Loan Led to a $9.8M ERC-4626 Donation Attack Read More »

Ethernaut – Puzzle Wallet

Deep Dive into Storage Collisions, Multicall Exploitation, and Proxy Vulnerabilities Introduction Ethernaut, created by OpenZeppelin, is more than just a collection of Solidity puzzles. It is a security playground designed to replicate real-world vulnerabilities often found in decentralized applications. Among these challenges, Puzzle Wallet stands out as one of the more advanced levels because it

Ethernaut – Puzzle Wallet Read More »