  <?xml version="1.0" encoding="utf-8"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/"><channel><title>51黑料网 Blog</title><link></link><description>Stay updated on the latest from 51黑料网 - a crowdsourcing platform that offers security services and tools to ensure the safety and reliability of smart contracts and AI systems.</description><pubDate>Tue, 14 Apr 2026 09:53:23 GMT</pubDate><ttl>3600</ttl><generator>Webflow</generator><atom:link href="/blog-posts/rss.xml" rel="self" type="application/rss+xml"/><item><title>The Digital Mandate: Why Certification Bodies Must Evolve | 51黑料网</title><link>/blog-posts/the-digital-mandate-why-certification-bodies-must-evolve</link><guid>/blog-posts/the-digital-mandate-why-certification-bodies-must-evolve</guid><description>Certification Bodies face a &quot;friction tax&quot; because old, manual audit processes rely on fragmented emails and manual evidence, wasting 30% to 40% of total audit time. The 51黑料网 ISO OS is an ERP system designed to automate these non-judgmental parts, aligning with IAF MD guidelines to allow experts to focus on quality and risk.</description><pubDate>Fri, 10 Apr 2026 14:23:28 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6970e4e861f24b1b1ffb2c91_Blog%20-%20Title%20Images.png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6970e4e861f24b1b1ffb2c91_Blog%20-%20Title%20Images.png"/></item><item><title>Breaking Down the Silos: Why We Built the World鈥檚 Largest Certification Body Database | 51黑料网</title><link>/blog-posts/breaking-down-the-silos-why-we-built-the-worlds-largest-certification-body-database</link><guid>/blog-posts/breaking-down-the-silos-why-we-built-the-worlds-largest-certification-body-database</guid><description>For decades, the world of ISO certification has been a fragmented landscape. If a company in Germany needed a specialized ISO 27001 auditor with experience in the healthcare sector, the search process often involved dozens of tabs, outdated PDF directories, and a fair amount of guesswork.</description><pubDate>Tue, 31 Mar 2026 06:51:36 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/69cb6df69180ab930c3a3cad_Blog%20-%20Title%20Images%20(2).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/69cb6df69180ab930c3a3cad_Blog%20-%20Title%20Images%20(2).png"/></item><item><title>AUDIT Token (The Audit Oracle) - Utilities &amp; Features | 51黑料网</title><link>/blog-posts/audit-token-utilities-features</link><guid>/blog-posts/audit-token-utilities-features</guid><description>The $AUDIT token is now live! We are grateful to everyone who supported us, whether through participation in liquidity bootstrapping or by helping to spread..</description><pubDate>Thu, 08 Jan 2026 17:33:58 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/692b22d787cfdc9763f425c7_AUDIT%20blog%20-%20cover.png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/692b22d787cfdc9763f425c7_AUDIT%20blog%20-%20cover.png"/></item><item><title>Critical Cybersecurity - NIS2 and DORA: How companies in the EU can reduce cyber risks and avoid fines through Pen-Testing, ISO 27001, and SOC 2 | 51黑料网</title><link>/blog-posts/critical-cybersecurity</link><guid>/blog-posts/critical-cybersecurity</guid><description>Europe is entering a new era of cybersecurity regulation. With NIS2 and DORA taking effect, organizations face increased expectations for governance, resilience, and operational security. </description><pubDate>Mon, 15 Dec 2025 09:17:11 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/693aadc84f4a050847efbbe6_Blog%20-%202028%20x%201365.png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/693aadc84f4a050847efbbe6_Blog%20-%202028%20x%201365.png"/></item><item><title>Your Roadmap to the EU AI Code of Practice | 51黑料网</title><link>/blog-posts/your-roadmap-to-the-eu-ai-code-of-practice</link><guid>/blog-posts/your-roadmap-to-the-eu-ai-code-of-practice</guid><description>The European Union has officially solidified its new AI Code of Practice. Released on July 24, 2025, this voluntary yet highly encouraged Code offers a clear pathway for businesses to prepare for the enforcement of the comprehensive EU AI Act, which is set to begin on August 2, 2025. </description><pubDate>Thu, 07 Aug 2025 09:24:34 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/688b1c04f08422a65954b3dc_MOIC%20-%20Blog%20-%202028%20x%201365%20(1).jpg" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/688b1c04f08422a65954b3dc_MOIC%20-%20Blog%20-%202028%20x%201365%20(1).jpg"/></item><item><title>51黑料网 and Sumsub Partner to Strengthen Web3 Identity Verification and Compliance | 51黑料网</title><link>/blog-posts/auditone-and-sumsub-partner-to-strengthen-web3-identity-verification-and-compliance</link><guid>/blog-posts/auditone-and-sumsub-partner-to-strengthen-web3-identity-verification-and-compliance</guid><description>51黑料网, a security &amp; compliance enabler for the digital asset space, is thrilled to announce a partnership with Sumsub, a leading identity verification platform that works to address the complex problem of identity verification in the decentralized Web3 ecosystem.</description><pubDate>Sat, 21 Jun 2025 07:21:36 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6853eb64be01ba3c855dae36_MOIC%20-%20Blog%20-%202028%20x%201365.jpg" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6853eb64be01ba3c855dae36_MOIC%20-%20Blog%20-%202028%20x%201365.jpg"/></item><item><title>Why Smart Contract Auditors Should Become ISO 27001 Certified | 51黑料网</title><link>/blog-posts/why-smart-contract-auditors-should-become-iso-27001-certified</link><guid>/blog-posts/why-smart-contract-auditors-should-become-iso-27001-certified</guid><description>In an era where cybersecurity incidents increasingly bridge both blockchain and traditional IT infrastructures...</description><pubDate>Mon, 19 May 2025 13:17:59 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/682514225197900e96b602a6_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(64).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/682514225197900e96b602a6_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(64).png"/></item><item><title>Why Becoming an ISO 27001 Auditor Is Your Next Big Career Move | 51黑料网</title><link>/blog-posts/why-becoming-an-iso-27001-auditor-is-your-next-big-career-move</link><guid>/blog-posts/why-becoming-an-iso-27001-auditor-is-your-next-big-career-move</guid><description>As data privacy and cybersecurity concerns continue to rise, organizations around the globe are investing significantly in safeguarding their information assets...</description><pubDate>Mon, 12 May 2025 13:52:48 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6821d76bb838a388a79e3f54_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(60).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6821d76bb838a388a79e3f54_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(60).png"/></item><item><title>The Loopscale Incident: A Case Study in Oracle Exploitation | 51黑料网</title><link>/blog-posts/the-loopscale-incident-a-case-study-in-oracle-exploitation</link><guid>/blog-posts/the-loopscale-incident-a-case-study-in-oracle-exploitation</guid><description>In late April 2025, Loopscale, an on-chain liquidity infrastructure project, fell victim to a sophisticated oracle manipulation exploit...</description><pubDate>Mon, 12 May 2025 13:52:48 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/681be417aaae908fd4791676_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(59).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/681be417aaae908fd4791676_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(59).png"/></item><item><title>The Next Frontier in DeFi Security: Autonomous Agents on the Frontlines | 51黑料网</title><link>/blog-posts/the-next-frontier-in-defi-security-autonomous-agents-on-the-frontlines</link><guid>/blog-posts/the-next-frontier-in-defi-security-autonomous-agents-on-the-frontlines</guid><description>What if the next big leap in DeFi security isn&#39;t just smarter code, but smarter actors?</description><pubDate>Tue, 29 Apr 2025 05:29:57 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6800e4e4965f4b2c7b9443f5_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(58).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6800e4e4965f4b2c7b9443f5_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(58).png"/></item><item><title>Mitigating a Critical Leverage Update Vulnerability in LeverageX | 51黑料网</title><link>/blog-posts/mitigating-a-critical-leverage-update-vulnerability-in-leveragex</link><guid>/blog-posts/mitigating-a-critical-leverage-update-vulnerability-in-leveragex</guid><description>LeverageX is a decentralized platform allowing users to open highly leveraged positions of up to 150x on multiple financial assets such as cryptocurrencies, stocks, and forex...</description><pubDate>Wed, 16 Apr 2025 19:15:32 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67fd6affe82f3ef411369d66_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(56).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67fd6affe82f3ef411369d66_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(56).png"/></item><item><title>The Hidden Dangers of AI: Why AI should be Audited | 51黑料网</title><link>/blog-posts/the-hidden-dangers-of-ai-why-ai-should-be-audited</link><guid>/blog-posts/the-hidden-dangers-of-ai-why-ai-should-be-audited</guid><description>In 2025, the AI landscape is filled with powerful models, including Llama 3.1-405B, GPT-4o, Gemini 1.5 Pro, Claude 3.5 Sonnet, O1 Preview, and the recently introduced DeepSeek R1...</description><pubDate>Sun, 13 Apr 2025 20:12:20 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67b7212e23b40236c8b89100_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(49).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67b7212e23b40236c8b89100_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(49).png"/></item><item><title>From Mt. Gox to PenPie: What Every Protocol Should Learn About Security | 51黑料网</title><link>/blog-posts/from-mt-gox-to-penpie-what-every-protocol-should-learn-about-security</link><guid>/blog-posts/from-mt-gox-to-penpie-what-every-protocol-should-learn-about-security</guid><description></description><pubDate>Wed, 09 Apr 2025 07:03:01 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67f2bfc80c84d1ca7c3cc9c0_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(55).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67f2bfc80c84d1ca7c3cc9c0_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(55).png"/></item><item><title>Enhancing Reward Accuracy: Securing BlueLabs Vault Operations | 51黑料网</title><link>/blog-posts/enhancing-reward-accuracy-securing-bluelabs-vault-operations</link><guid>/blog-posts/enhancing-reward-accuracy-securing-bluelabs-vault-operations</guid><description>BlueLabs is a Web3 infrastructure supplier that bridges decentralized finance (DeFi), multi-chain environments, and digital commerce...</description><pubDate>Wed, 02 Apr 2025 18:12:05 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67eafa72f6ff6752cd19408f_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(53).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67eafa72f6ff6752cd19408f_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(53).png"/></item><item><title>Auditor of the Month: The Art and Science of Auditing with Enami | 51黑料网</title><link>/blog-posts/auditor-of-the-month-the-art-and-science-of-auditing-with-enami</link><guid>/blog-posts/auditor-of-the-month-the-art-and-science-of-auditing-with-enami</guid><description>In the fast-paced world of blockchain security, few names stand out like Enami. A cybersecurity engineer with a deep passion for Web3, Enami has made a significant impact in the field, securing decentralized systems and uncovering vulnerabilities...</description><pubDate>Fri, 28 Mar 2025 14:11:59 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67e47af86e892b83818ea504_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(52).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67e47af86e892b83818ea504_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(52).png"/></item><item><title>The Bybit Exploit: A Stark Reminder of Crypto鈥檚 Security Challenges | 51黑料网</title><link>/blog-posts/the-bybit-exploit-a-stark-reminder-of-cryptos-security-challenges</link><guid>/blog-posts/the-bybit-exploit-a-stark-reminder-of-cryptos-security-challenges</guid><description>In February 2025, Bybit, one of the world鈥檚 largest crypto exchanges, suffered a massive security breach...</description><pubDate>Fri, 28 Mar 2025 14:11:59 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67e1a2c2f0ee95ef09c37601_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(54).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67e1a2c2f0ee95ef09c37601_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(54).png"/></item><item><title>The Rise and Risks of Memecoins: A Comprehensive Guide to Protecting Investors | 51黑料网</title><link>/blog-posts/the-rise-and-risks-of-memecoins-a-comprehensive-guide-to-protecting-investors</link><guid>/blog-posts/the-rise-and-risks-of-memecoins-a-comprehensive-guide-to-protecting-investors</guid><description>Memecoins have captivated the cryptocurrency world, emerging as viral phenomena driven by internet culture, speculative hype, and promises of overnight riches...</description><pubDate>Mon, 10 Mar 2025 08:31:52 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67bdb487a984ebd3b0631085_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(50).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67bdb487a984ebd3b0631085_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(50).png"/></item><item><title>Preventing Revenue Loss: Fixing Costly Smart Contract Issues for Shi-Universe | 51黑料网</title><link>/blog-posts/preventing-revenue-loss-fixing-costly-smart-contract-issues-for-shi-universe</link><guid>/blog-posts/preventing-revenue-loss-fixing-costly-smart-contract-issues-for-shi-universe</guid><description>Shi-Universe, a gaming NFT platform on IOTA, would have unknowingly lost revenue due to critical flaws in its smart contracts. </description><pubDate>Tue, 11 Feb 2025 09:36:09 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67a9fc12820a4d43837af705_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(48).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67a9fc12820a4d43837af705_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(48).png"/></item><item><title>The Intersection of AI and DeFi Security: Unpacking the Black Box | 51黑料网</title><link>/blog-posts/the-intersection-of-ai-and-defi-security-unpacking-the-black-box</link><guid>/blog-posts/the-intersection-of-ai-and-defi-security-unpacking-the-black-box</guid><description>As artificial intelligence (AI) advances with increased computational power and more complex training models, its integration with decentralized finance (DeFi) presents both opportunities and challenges...</description><pubDate>Wed, 05 Feb 2025 11:43:57 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67a10e59227693ed4c102386_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(47).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67a10e59227693ed4c102386_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(47).png"/></item><item><title>KyberSwap Exploit: A Comprehensive Breakdown | 51黑料网</title><link>/blog-posts/kyberswap-exploit-a-comprehensive-breakdown</link><guid>/blog-posts/kyberswap-exploit-a-comprehensive-breakdown</guid><description>On November 23, 2023, KyberSwap, a decentralized trading platform, suffered a massive attack that resulted in the theft of approximately $47 million and a 90% decline in its Total Value Locked (TVL).</description><pubDate>Tue, 04 Feb 2025 13:06:24 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246990e30fdb215b81d1_658d6d940c9624465243b87a_KyberSwap%2520Exploit%2520A%2520Comprehensive%2520Breakdown.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246990e30fdb215b81d1_658d6d940c9624465243b87a_KyberSwap%2520Exploit%2520A%2520Comprehensive%2520Breakdown.avif"/></item><item><title>How to Read a Smart Contract Audit Report | 51黑料网</title><link>/blog-posts/how-to-read-a-smart-contract-audit-report</link><guid>/blog-posts/how-to-read-a-smart-contract-audit-report</guid><description>Smart contract audits occur for security purposes, but most projects view it as a marketing strategy. Whatever the reason the project gets an audit, in the end, a report is produced with actionable...</description><pubDate>Tue, 04 Feb 2025 13:06:24 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246948fd45ca52c53aa5_63ce6c24c8b33a72d52dee85_How%2520to%2520Read%2520a%2520Smart%2520Contract%2520Audit%2520Report.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246948fd45ca52c53aa5_63ce6c24c8b33a72d52dee85_How%2520to%2520Read%2520a%2520Smart%2520Contract%2520Audit%2520Report.avif"/></item><item><title>Exploring Web3 Bug Bounty Programs | 51黑料网</title><link>/blog-posts/exploring-web3-bug-bounty-programs</link><guid>/blog-posts/exploring-web3-bug-bounty-programs</guid><description>Smart Contract Audits an important security measure, but not the only one. Explore the benefits of running a Bug Bounty program.</description><pubDate>Tue, 04 Feb 2025 13:06:24 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624672f89bdd172d5c817_650c2ad13e06c0e029fd6c3b_bugbounty.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624672f89bdd172d5c817_650c2ad13e06c0e029fd6c3b_bugbounty.avif"/></item><item><title>AI Systems Auditing Insights: Enhancing Transparency, Security, and Legal Compliance | 51黑料网</title><link>/blog-posts/ai-systems-auditing-insights-enhancing-transparency-security-and-legal-compliance</link><guid>/blog-posts/ai-systems-auditing-insights-enhancing-transparency-security-and-legal-compliance</guid><description>In contemporary society, artificial intelligence (AI) has become pervasive in various facets, including everyday services, commodities, and technological applications</description><pubDate>Mon, 03 Feb 2025 19:46:53 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246343c141ecfe4d3ce7_65df07782d54ce6f664b4644_Article%2520Blog%2520(2028%2520x%25201365%2520px).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246343c141ecfe4d3ce7_65df07782d54ce6f664b4644_Article%2520Blog%2520(2028%2520x%25201365%2520px).avif"/></item><item><title>5 Responsibilities of a Smart-Contract Auditor | 51黑料网</title><link>/blog-posts/5-responsibilities-of-a-smart-contract-auditor</link><guid>/blog-posts/5-responsibilities-of-a-smart-contract-auditor</guid><description>Smart contracts are immutable, and bugs cannot be easily patched, unlike regular programs. Here are five responsibilities that smart-contract auditors must take on to make your project safe.</description><pubDate>Mon, 03 Feb 2025 19:46:47 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624635e349086aa69f02e_63ce6cb19027a62cdb094293_5%2520Responsibilities%2520of%2520a%2520Smart-Contract%2520Auditor.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624635e349086aa69f02e_63ce6cb19027a62cdb094293_5%2520Responsibilities%2520of%2520a%2520Smart-Contract%2520Auditor.avif"/></item><item><title>Anatomy Of Web3 Insurance | 51黑料网</title><link>/blog-posts/anatomy-of-web3-insurance</link><guid>/blog-posts/anatomy-of-web3-insurance</guid><description>Safeguarding DeFi Investments with Web3 Insurance</description><pubDate>Mon, 03 Feb 2025 19:46:37 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463dfd8cb963035d9ac_649564a2c6f2b79e11f3306b_imae.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463dfd8cb963035d9ac_649564a2c6f2b79e11f3306b_imae.avif"/></item><item><title>Auditing A Solidity Contract: Episode 1 - Re-entrancy Attack | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-1---re-entrancy-attack</link><guid>/blog-posts/auditing-a-solidity-contract-episode-1---re-entrancy-attack</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem.</description><pubDate>Mon, 03 Feb 2025 19:46:31 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463bda46d4322135865_6617a44665b96b39bf934507_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(4).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463bda46d4322135865_6617a44665b96b39bf934507_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(4).avif"/></item><item><title>Auditing A Solidity Contract: Episode 3 - Security Analysis | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-3---security-analysis</link><guid>/blog-posts/auditing-a-solidity-contract-episode-3---security-analysis</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem.</description><pubDate>Mon, 03 Feb 2025 19:46:24 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463f7a4d9bcc74a3ede_662f7ca4129a650dabe9cc52_Episode.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462463f7a4d9bcc74a3ede_662f7ca4129a650dabe9cc52_Episode.avif"/></item><item><title>Auditing A Solidity Contract: Episode 2 - Delegatecall | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-2---delegatecall</link><guid>/blog-posts/auditing-a-solidity-contract-episode-2---delegatecall</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem.</description><pubDate>Mon, 03 Feb 2025 19:46:17 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624637b52b8e8ba97dede_6628d1af21a82af8baf5f7fa_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(6).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624637b52b8e8ba97dede_6628d1af21a82af8baf5f7fa_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(6).avif"/></item><item><title>Auditing A Solidity Contract: Episode 5 - Automated Testing Tools | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-5---automated-testing-tools</link><guid>/blog-posts/auditing-a-solidity-contract-episode-5---automated-testing-tools</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem.</description><pubDate>Mon, 03 Feb 2025 19:46:11 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246483ad616177547aaf_6645d7f2fe15f73c542f4f0c_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(10).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246483ad616177547aaf_6645d7f2fe15f73c542f4f0c_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(10).avif"/></item><item><title>Auditing A Solidity Contract: Episode 4 - Testing | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-4---testing</link><guid>/blog-posts/auditing-a-solidity-contract-episode-4---testing</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem.</description><pubDate>Mon, 03 Feb 2025 19:46:04 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624641808f10622942c24_6638a1f04056aefa35d5b022_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(8).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624641808f10622942c24_6638a1f04056aefa35d5b022_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(8).avif"/></item><item><title>51黑料网 Roundtable with Alexey from Aurora and Guido Vranken | 51黑料网</title><link>/blog-posts/auditone-roundtable-with-alexey-from-aurora-and-guido-vranken</link><guid>/blog-posts/auditone-roundtable-with-alexey-from-aurora-and-guido-vranken</guid><description>In a recent 51黑料网&#39;s Twitter Spaces roundtable, we had the opportunity to delve into the world of Web3 security with key players in the industry: Alexey Lapitsky, Guido Vranken and Raja Thota.</description><pubDate>Mon, 03 Feb 2025 19:45:57 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462464859f07541beda6db_6554cfd5ee12847a87506e9c_51黑料网%2520Roundtable%2520with%2520Alexey%2520from%2520Aurora%2520and%2520Guido%2520Vranken.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462464859f07541beda6db_6554cfd5ee12847a87506e9c_51黑料网%2520Roundtable%2520with%2520Alexey%2520from%2520Aurora%2520and%2520Guido%2520Vranken.avif"/></item><item><title>51黑料网 scored second place at HackOnChain! | 51黑料网</title><link>/blog-posts/auditone-scored-second-place-at-hackonchain</link><guid>/blog-posts/auditone-scored-second-place-at-hackonchain</guid><description>51黑料网 won twice the 2nd prize at HackOnChain hackathon, one in the main prize pool category and the other in Q.org challenge...</description><pubDate>Mon, 03 Feb 2025 19:45:50 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465815c8d0b33ef8a2a_63ce6cdce546a5b6338e5c36_51黑料网%2520scored%2520second%2520place%2520at%2520HackOnChain!.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465815c8d0b33ef8a2a_63ce6cdce546a5b6338e5c36_51黑料网%2520scored%2520second%2520place%2520at%2520HackOnChain!.avif"/></item><item><title>Best Practices for Web3 Bug Bounty Programs | 51黑料网</title><link>/blog-posts/best-practices-for-web3-bug-bounty-programs</link><guid>/blog-posts/best-practices-for-web3-bug-bounty-programs</guid><description>Securing a private centralized system is relatively straightforward compared to safeguarding the public network that is Web3. Smart contracts depend on predefined rules.</description><pubDate>Mon, 03 Feb 2025 19:45:41 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465b90b48d0efe151f3_65fc2251104e90dcc8d95a18_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(1).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465b90b48d0efe151f3_65fc2251104e90dcc8d95a18_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365%2520(1).avif"/></item><item><title>Biggest crypto hacks 2021 and how to avoid them | 51黑料网</title><link>/blog-posts/biggest-crypto-hacks-2021-and-how-to-avoid-them</link><guid>/blog-posts/biggest-crypto-hacks-2021-and-how-to-avoid-them</guid><description>In 2021 we saw an incremental rise in the adoption and interest in the cryptocurrency industry, leading to the increase in the development and investment of DeFi platforms.</description><pubDate>Mon, 03 Feb 2025 19:45:34 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246597264f4ce3f0f1ec_63ce6c88b086d43e5f0a6067_Biggest%2520crypto%2520hacks%25202021%2520and%2520how%2520to%2520avoid%2520them.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246597264f4ce3f0f1ec_63ce6c88b086d43e5f0a6067_Biggest%2520crypto%2520hacks%25202021%2520and%2520how%2520to%2520avoid%2520them.avif"/></item><item><title>Blockchain and Sustainability | 51黑料网</title><link>/blog-posts/blockchain-and-sustainability</link><guid>/blog-posts/blockchain-and-sustainability</guid><description>Embracing new technologies that enable drastic reductions in greenhouse gas (GHG) emissions will be crucial to a successful transition. Emerging DLT have the potential to improve current processes.</description><pubDate>Mon, 03 Feb 2025 19:45:29 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246522ba686661729bf5_63ce6c6797fef7db4ba318ac_Blockchain%2520and%2520Sustainability.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246522ba686661729bf5_63ce6c6797fef7db4ba318ac_Blockchain%2520and%2520Sustainability.avif"/></item><item><title>Blockchain Buzz in Berlin | 51黑料网</title><link>/blog-posts/blockchain-buzz-in-berlin</link><guid>/blog-posts/blockchain-buzz-in-berlin</guid><description>Berlin has become an important venue for events and information about blockchain technologies. As a regional information and networking format, numerous meetups are held in Berlin.</description><pubDate>Mon, 03 Feb 2025 19:45:23 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465859f07541beda738_63ce6c7510f455dfe4f03e02_Blockchain%2520Buzz%2520in%2520Berlin.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462465859f07541beda738_63ce6c7510f455dfe4f03e02_Blockchain%2520Buzz%2520in%2520Berlin.avif"/></item><item><title>Bug Bounty | 51黑料网</title><link>/blog-posts/bug-bounty</link><guid>/blog-posts/bug-bounty</guid><description>鈥淓very crypto project is just a bug bounty project in disguise.鈥 CTO at Immunefi. One error can cost millions if exploited. Auditing a smart contract and bug bounty programs help mitigate these risks.</description><pubDate>Mon, 03 Feb 2025 19:45:17 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462466afef842f001e1b05_63ce6c31a77e08325fba72ed_Bug%2520Bounty.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462466afef842f001e1b05_63ce6c31a77e08325fba72ed_Bug%2520Bounty.avif"/></item><item><title>Case Study: 51黑料网鈥檚 Audit of Aurora Fast Bridge Smart Contracts | 51黑料网</title><link>/blog-posts/case-study-auditones-audit-of-aurora-fast-bridge-smart-contracts</link><guid>/blog-posts/case-study-auditones-audit-of-aurora-fast-bridge-smart-contracts</guid><description>51黑料网&#39;s collaborative approach ensured enhanced security and user trust in Aurora&#39;s platform during an audit of Fast Bridge contracts.</description><pubDate>Mon, 03 Feb 2025 19:45:11 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246771ad22a915596a86_65b70dca8f16376d855438b9_audit%2520of%2520Aurora%2520Fast%2520Bridge%2520%2520smart%2520contracts.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246771ad22a915596a86_65b70dca8f16376d855438b9_audit%2520of%2520Aurora%2520Fast%2520Bridge%2520%2520smart%2520contracts.avif"/></item><item><title>Curve Pool Exploits - $24M Heist and Multiple DeFi Projects Losses. What happened? | 51黑料网</title><link>/blog-posts/curve-pool-exploits-24m-heist-and-multiple-defi-projects-losses-what-happened</link><guid>/blog-posts/curve-pool-exploits-24m-heist-and-multiple-defi-projects-losses-what-happened</guid><description>The root cause of the exploit was traced back to specific versions of the Vyper compiler, a Python-based programming language used for creating smart contracts on the Eth.</description><pubDate>Mon, 03 Feb 2025 19:45:05 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246746fcc0c0fb022bde_6552c738e71a1201cc6f6bbd_Curve%2520Pool%2520Exploits%2520-%2520%252424M%2520Heist%2520and%2520Multiple%2520DeFi%2520Projects%2520Losses.%2520What%2520happened.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246746fcc0c0fb022bde_6552c738e71a1201cc6f6bbd_Curve%2520Pool%2520Exploits%2520-%2520%252424M%2520Heist%2520and%2520Multiple%2520DeFi%2520Projects%2520Losses.%2520What%2520happened.avif"/></item><item><title>Evolving AI Audits: Adapting to the Generative AI Era | 51黑料网</title><link>/blog-posts/evolving-ai-audits-adapting-to-the-generative-ai-era</link><guid>/blog-posts/evolving-ai-audits-adapting-to-the-generative-ai-era</guid><description>AI systems have been evolving from just prediction algorithms to generative models, disrupting almost every industry, as are the approaches in auditing AI systems.</description><pubDate>Mon, 03 Feb 2025 19:44:58 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462467afef842f001e1bf6_6602bfc50c264b8edbef4709_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462467afef842f001e1bf6_6602bfc50c264b8edbef4709_Case%2520Study%2520-%2520Blog%2520-%25202028%2520x%25201365.avif"/></item><item><title>How to Prepare for a Successful Smart Contract Audit | 51黑料网</title><link>/blog-posts/how-to-prepare-for-a-successful-smart-contract-audit</link><guid>/blog-posts/how-to-prepare-for-a-successful-smart-contract-audit</guid><description>Preparation for smart contract audits begins before the project reaches the auditor. Test-driven development, good internal control and documentation can be valuable to the auditing process.</description><pubDate>Mon, 03 Feb 2025 19:44:51 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462469298b916e214d93ff_63ce6c94440ed76efd0bb38f_How%2520to%2520Prepare%2520for%2520a%2520Successful%2520Smart%2520Contract%2520Audit.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462469298b916e214d93ff_63ce6c94440ed76efd0bb38f_How%2520to%2520Prepare%2520for%2520a%2520Successful%2520Smart%2520Contract%2520Audit.avif"/></item><item><title>How DeFi Insurance Pools Work | 51黑料网</title><link>/blog-posts/how-defi-insurance-pools-work</link><guid>/blog-posts/how-defi-insurance-pools-work</guid><description>In the rapidly evolving world of cryptocurrency, decentralized finance (DeFi) has emerged as a game-changer. However, with this new technology comes new risks, such as smart contract bugs and hacking.</description><pubDate>Mon, 03 Feb 2025 19:44:44 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462469bda46d4322136989_64b1358649b5b1550df1b6a9_How%2520DeFi%2520insurance%2520pools%2520work.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66462469bda46d4322136989_64b1358649b5b1550df1b6a9_How%2520DeFi%2520insurance%2520pools%2520work.avif"/></item><item><title>Importance of Proof of Reserve Audits in 2023 | 51黑料网</title><link>/blog-posts/importance-of-proof-of-reserve-audits-in-2023</link><guid>/blog-posts/importance-of-proof-of-reserve-audits-in-2023</guid><description>The future of proof of reserve audits in a crypto exchange is likely to become more important as the industry matures. More exchanges will likely be required to ensure that customer funds are secure.</description><pubDate>Mon, 03 Feb 2025 19:44:36 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624698383dda9a38bc44d_63d0f56bc268153813a1d716_Importance-of-Proof-of.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624698383dda9a38bc44d_63d0f56bc268153813a1d716_Importance-of-Proof-of.avif"/></item><item><title>Limitations to a smart contract audit | 51黑料网</title><link>/blog-posts/limitations-to-a-smart-contract-audit</link><guid>/blog-posts/limitations-to-a-smart-contract-audit</guid><description>Audit reports are a badge of honor for a DeFi project. Projects proudly displayed their audit reports but said audit couldn&#39;t prevent malicious actors.</description><pubDate>Mon, 03 Feb 2025 19:44:30 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246ab2f17626b45542f7_63ce6ca3a77e080fb7ba7b2b_Limitations%2520to%2520a%2520smart%2520contract%2520audit.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246ab2f17626b45542f7_63ce6ca3a77e080fb7ba7b2b_Limitations%2520to%2520a%2520smart%2520contract%2520audit.avif"/></item><item><title>Nomad Community Hacking | 51黑料网</title><link>/blog-posts/nomad-community-hacking</link><guid>/blog-posts/nomad-community-hacking</guid><description>In the wake of all the hacks occurring in the DeFi space, if I have to convince you why security should be a number one priority, something is wrong. Nomad popped like a pi帽ata, and everyone wanted...</description><pubDate>Mon, 03 Feb 2025 19:40:17 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246a35dbf187bd42f071_63bab389f28c5000314d4432_8.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246a35dbf187bd42f071_63bab389f28c5000314d4432_8.avif"/></item><item><title>Phishing Attack | 51黑料网</title><link>/blog-posts/phishing-attack</link><guid>/blog-posts/phishing-attack</guid><description>Imagine spending thousands on a smart contract audit, then either your users or people on your team fall victim to a phishing attack draining your company of millions...</description><pubDate>Mon, 03 Feb 2025 19:40:10 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246a0e1838841ed6b59d_63ce6c15fc37df484afe8d8a_Phishing%2520Attack.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246a0e1838841ed6b59d_63ce6c15fc37df484afe8d8a_Phishing%2520Attack.avif"/></item><item><title>Six Biggest DeFi Exploits in 2022 so far | 51黑料网</title><link>/blog-posts/six-biggest-defi-exploits-in-2022-so-far</link><guid>/blog-posts/six-biggest-defi-exploits-in-2022-so-far</guid><description>According to the Rekt leaderboard, the six biggest DeFi exploits in 2022 so far have a total of $1.8 billion. In 2021 the total value stolen was $1.3 billion.</description><pubDate>Mon, 03 Feb 2025 19:40:04 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246ccd4b5a3276d6ecb5_63ce6c5bd805d5670512e667_Six%2520Biggest%2520DeFi%2520Exploits%2520in%25202022%2520so%2520far.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246ccd4b5a3276d6ecb5_63ce6c5bd805d5670512e667_Six%2520Biggest%2520DeFi%2520Exploits%2520in%25202022%2520so%2520far.avif"/></item><item><title>Web 3.0 vs. Web 2.0, What&#39;s the Difference? | 51黑料网</title><link>/blog-posts/web-3-0-vs-web-2-0-whats-the-difference</link><guid>/blog-posts/web-3-0-vs-web-2-0-whats-the-difference</guid><description>Web3.0 is a term used to describe the next generation of the World Wide Web. It is considered a successor to the current web 2.0, which we have used since 2005...</description><pubDate>Mon, 03 Feb 2025 19:39:59 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c0fe3a5e7723ef548_63ce6cc29027a6701209432c_Web%25203.0%2520vs.%2520Web%25202.0%252C%2520What%2527s%2520the%2520Difference.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c0fe3a5e7723ef548_63ce6cc29027a6701209432c_Web%25203.0%2520vs.%2520Web%25202.0%252C%2520What%2527s%2520the%2520Difference.avif"/></item><item><title>What is a Token Audit, and Why Should You Care About It? | 51黑料网</title><link>/blog-posts/what-is-a-token-audit-and-why-should-you-care-about-it</link><guid>/blog-posts/what-is-a-token-audit-and-why-should-you-care-about-it</guid><description>In 2023, $1.79 billion was lost due to 751 security incidents. Each incident resulted in an average loss of $2.45 million. The highest losses of $686,558,472 occurred in Q3 from 183 hacks.</description><pubDate>Mon, 03 Feb 2025 19:39:51 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c43c141ecfe4d40c3_65ba22d20dafda2643e38db6_What%2520is%2520a%2520Token%2520Audit%252C%2520and%2520Why%2520Should%2520You%2520Care%2520About%2520It.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c43c141ecfe4d40c3_65ba22d20dafda2643e38db6_What%2520is%2520a%2520Token%2520Audit%252C%2520and%2520Why%2520Should%2520You%2520Care%2520About%2520It.avif"/></item><item><title>The $7.5 Million Flash Loan Unveiled: Jimbo鈥檚 Protocol | 51黑料网</title><link>/blog-posts/the-7-5-million-flash-loan-unveiled-analyzing-jimbos-protocol-attack</link><guid>/blog-posts/the-7-5-million-flash-loan-unveiled-analyzing-jimbos-protocol-attack</guid><description>A significant flash loan attack has recently targeted Jimbo鈥檚 Protocol, resulting in a staggering loss of $7.5 million. In this article, we provide a concise analysis of the incident, shedding light o</description><pubDate>Mon, 03 Feb 2025 19:39:44 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c815c8d0b33ef8c7f_655338884dd9a58ea4aef658_The%2520%25247.5%2520Million%2520Flash%2520Loan%2520Unveiled%2520Jimbo%25E2%2580%2599s%2520Protocol.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c815c8d0b33ef8c7f_655338884dd9a58ea4aef658_The%2520%25247.5%2520Million%2520Flash%2520Loan%2520Unveiled%2520Jimbo%25E2%2580%2599s%2520Protocol.avif"/></item><item><title>What is 51黑料网? | 51黑料网</title><link>/blog-posts/what-is-auditone</link><guid>/blog-posts/what-is-auditone</guid><description>51黑料网 is an all-in-one security platform for smart contracts. The platform offers a range of security services and tools to ensure the security and reliability of smart contracts.</description><pubDate>Mon, 03 Feb 2025 19:39:37 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c7a01068df0b48538_65533e2989d1733f2751f90c_Copy%2520of%2520Blog%2520Banners.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246c7a01068df0b48538_65533e2989d1733f2751f90c_Copy%2520of%2520Blog%2520Banners.avif"/></item><item><title>Your NFT Can Be Hacked! All You Need To Know About NFT Security | 51黑料网</title><link>/blog-posts/your-nft-can-be-hacked-all-you-need-to-know-about-nft-security</link><guid>/blog-posts/your-nft-can-be-hacked-all-you-need-to-know-about-nft-security</guid><description>Yes, your NFT can be hacked! While the notion of NFTs being fascinating is widespread, security considerations often take a back seat. Here&#39;s a comprehensive guide to understanding NFT security.</description><pubDate>Mon, 03 Feb 2025 19:39:31 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246d49f88ea06d7de8a5_64d211c78e441d0f76845514_blog1.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246d49f88ea06d7de8a5_64d211c78e441d0f76845514_blog1.avif"/></item><item><title>Auditor of the Month: Interview with Ubermensch, Web3 Auditor Expert at 51黑料网 | 51黑料网</title><link>/blog-posts/auditor-of-the-month-interview-with-ubermensch-web3-auditor-expert-at-auditone</link><guid>/blog-posts/auditor-of-the-month-interview-with-ubermensch-web3-auditor-expert-at-auditone</guid><description>As we approach the end of May, we&#39;re pleased to introduce Ubermensch as our Auditor of the Month...</description><pubDate>Mon, 03 Feb 2025 19:39:22 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6658578fd631a4b1672abd61_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(12).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6658578fd631a4b1672abd61_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(12).avif"/></item><item><title>Auditing A Solidity Contract: Episode 6 - Frontrunning | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-6--frontrunning</link><guid>/blog-posts/auditing-a-solidity-contract-episode-6--frontrunning</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem...</description><pubDate>Mon, 03 Feb 2025 19:39:14 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/665ef8a98375ef23aef013d1_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(13).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/665ef8a98375ef23aef013d1_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(13).avif"/></item><item><title>Auditing A Solidity Contract: Episode 7 - Documentation and Reporting  | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-7--documentation-and-reporting</link><guid>/blog-posts/auditing-a-solidity-contract-episode-7--documentation-and-reporting</guid><description>Smart contracts can be complex, but clear documentation provides transparency. Keeping detailed records can simplify the auditing processes...</description><pubDate>Mon, 03 Feb 2025 19:39:09 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6670172ea91c1e07c4b531ee_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(14).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6670172ea91c1e07c4b531ee_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(14).avif"/></item><item><title>Dark Mythos becomes a partner and joins the loyalty program | 51黑料网</title><link>/blog-posts/dark-mythos-becomes-a-partner-and-joins-the-loyalty-program</link><guid>/blog-posts/dark-mythos-becomes-a-partner-and-joins-the-loyalty-program</guid><description>Dark Mythos purchased 100,000 $AUDIT on MagicSea to lock the tokens, gaining access to considerable privileges through 51黑料网&#39;s loyalty program. Here&#39;s how this investment will benefit Dark Mythos&#39; platform and security.</description><pubDate>Mon, 03 Feb 2025 19:38:54 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6697c1ae94d41c44baa8b7ce_Dark%20Mythos.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6697c1ae94d41c44baa8b7ce_Dark%20Mythos.avif"/></item><item><title>Auditing A Solidity Contract: Episode 8 - Benefits of Auditing | 51黑料网</title><link>/blog-posts/auditing-a-solidity-contract-episode-8---benefits-of-auditing</link><guid>/blog-posts/auditing-a-solidity-contract-episode-8---benefits-of-auditing</guid><description>Smart contracts are self-executing codes that form the backbone of the Web3 ecosystem...</description><pubDate>Mon, 03 Feb 2025 19:38:48 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/669f905dc878115c9030f5e4_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(16).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/669f905dc878115c9030f5e4_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(16).avif"/></item><item><title>The New Elites Game: Security, Challenges, and Future Goals | 51黑料网</title><link>/blog-posts/the-new-elites-game-security-challenges-and-future-goals</link><guid>/blog-posts/the-new-elites-game-security-challenges-and-future-goals</guid><description>Summary of AMA with the Founders of The New Elites: Pioneering the Future of GameFi</description><pubDate>Mon, 03 Feb 2025 19:38:43 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66a8d56c99a84893fc568a2f_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(17).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66a8d56c99a84893fc568a2f_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(17).avif"/></item><item><title>Security Audits &amp; Web3 | 51黑料网</title><link>/blog-posts/security-audits-web3</link><guid>/blog-posts/security-audits-web3</guid><description>The role of websites and services in Web 3 is taken over by decentralized applications (dApps) as a central part of the next stage of the Internet evolution.</description><pubDate>Mon, 03 Feb 2025 19:38:38 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66cc559a3bfb3408f5f6ddb9_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(18).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66cc559a3bfb3408f5f6ddb9_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(18).avif"/></item><item><title>AMA with Rethink.Finance: Exploring Next-Gen Asset Management | 51黑料网</title><link>/blog-posts/ama-with-rethink-finance-exploring-next-gen-asset-management</link><guid>/blog-posts/ama-with-rethink-finance-exploring-next-gen-asset-management</guid><description>In this exclusive AMA we covered the Rethink Protocol&#39;s advanced security practices, innovative asset management on Ethereum...</description><pubDate>Mon, 03 Feb 2025 19:38:33 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66d0532ddd31083867c35cff_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(20).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66d0532ddd31083867c35cff_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(20).avif"/></item><item><title>Healthy AI needs FAT: Auditing to keep AI systems in Check Introduction | 51黑料网</title><link>/blog-posts/healthy-ai-needs-fat-auditing-to-keep-ai-systems-in-check-introduction</link><guid>/blog-posts/healthy-ai-needs-fat-auditing-to-keep-ai-systems-in-check-introduction</guid><description>As Artificial Intelligence (AI) continues to integrate deeply into various sectors, from healthcare to finance, it is important to...</description><pubDate>Mon, 03 Feb 2025 19:38:25 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66d49839a2921cf703f869e2_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(21).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66d49839a2921cf703f869e2_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(21).avif"/></item><item><title>DeFi Exchange Audit: Why It&#39;s Important | 51黑料网</title><link>/blog-posts/defi-exchange-audit-why-it-is-important</link><guid>/blog-posts/defi-exchange-audit-why-it-is-important</guid><description>Securing private keys in DeFi is crucial to prevent losing access to funds. Hacks often target vulnerable keys, making self-custody a challenge that demands robust wallet security. </description><pubDate>Mon, 03 Feb 2025 19:38:19 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66ded0b7f17886feed645a7a_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(17).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66ded0b7f17886feed645a7a_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(17).avif"/></item><item><title>The Critical Role Of DeFi Insurance After Smart Contract Auditing  | 51黑料网</title><link>/blog-posts/the-critical-role-of-defi-insurance-after-smart-contract-auditing</link><guid>/blog-posts/the-critical-role-of-defi-insurance-after-smart-contract-auditing</guid><description>If it&#39;s self-executing and lives on the blockchain, what is it? Correct, it&#39;s a smart contract...</description><pubDate>Mon, 03 Feb 2025 19:38:14 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66faa30416857e2503260741_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(26).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66faa30416857e2503260741_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(26).avif"/></item><item><title>Securing the Future of GameFi: Challenges and Best Practices | 51黑料网</title><link>/blog-posts/securing-the-future-of-gamefi-challenges-and-best-practices</link><guid>/blog-posts/securing-the-future-of-gamefi-challenges-and-best-practices</guid><description>GameFi, a fusion of gaming and decentralized finance (DeFi), has revolutionized the gaming...</description><pubDate>Mon, 03 Feb 2025 19:38:09 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6705011bc95ceb07bd5bd73c_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(24).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6705011bc95ceb07bd5bd73c_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(24).avif"/></item><item><title>The 10,000 Bitcoin Pizza: A Lesson in Blockchain Transparency and the Power of Auditing | 51黑料网</title><link>/blog-posts/the-10-000-bitcoin-pizza-a-lesson-in-blockchain-transparency-and-the-power-of-auditing</link><guid>/blog-posts/the-10-000-bitcoin-pizza-a-lesson-in-blockchain-transparency-and-the-power-of-auditing</guid><description> </description><pubDate>Mon, 03 Feb 2025 19:38:03 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/670cfae251d3cc771476e0fb_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(27).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/670cfae251d3cc771476e0fb_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(27).avif"/></item><item><title>The PenPie Hack: Understanding the September 2024 Reentrancy Exploit and the Role of Auditing in DeFi Security | 51黑料网</title><link>/blog-posts/the-penpie-hack-understanding-the-september-2024-reentrancy-exploit-and-the-role-of-auditing-in-defi-security</link><guid>/blog-posts/the-penpie-hack-understanding-the-september-2024-reentrancy-exploit-and-the-role-of-auditing-in-defi-security</guid><description> </description><pubDate>Mon, 03 Feb 2025 19:37:53 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6716232be1ad1df69f79795c_MOIC%20-%20Blog%20-%202028%20x%201365.png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6716232be1ad1df69f79795c_MOIC%20-%20Blog%20-%202028%20x%201365.png"/></item><item><title>Key EIPs In The Ethereum&#39;s Pectra Upgrade | 51黑料网</title><link>/blog-posts/key-eips-in-the-ethereums-pectra-upgrade</link><guid>/blog-posts/key-eips-in-the-ethereums-pectra-upgrade</guid><description>Over the years, the Ethereum network has undergone several key upgrades that align with its roadmap, pushing the boundaries of decentralization, scalability, and security.</description><pubDate>Mon, 03 Feb 2025 19:37:44 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/671f726c1f8937033198dd86_MOIC%20-%20Blog%20-%202028%20x%201365%20(2).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/671f726c1f8937033198dd86_MOIC%20-%20Blog%20-%202028%20x%201365%20(2).png"/></item><item><title>Exploring Zero-Knowledge Proofs: A Comparative Dive into zk-SNARKs, zk-STARKs, and Bulletproofs | 51黑料网</title><link>/blog-posts/exploring-zero-knowledge-proofs-a-comparative-dive-into-zk-snarks-zk-starks-and-bulletproofs</link><guid>/blog-posts/exploring-zero-knowledge-proofs-a-comparative-dive-into-zk-snarks-zk-starks-and-bulletproofs</guid><description> </description><pubDate>Mon, 03 Feb 2025 19:37:38 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67333c273b33ee5c856bd031_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(30).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67333c273b33ee5c856bd031_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(30).png"/></item><item><title>Unpacking Multisig Hacks In DeFi Radiant Capital&#39;s Case | 51黑料网</title><link>/blog-posts/unpacking-multisig-hacks-in-defi-radiant-capitals-case</link><guid>/blog-posts/unpacking-multisig-hacks-in-defi-radiant-capitals-case</guid><description>In October 2024, Radiant Capital, a major player in DeFi lending, faced its second major security breach of the year...</description><pubDate>Mon, 03 Feb 2025 19:37:29 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/673df0a77cbd454ee8e66ce6_MOIC%20-%20Blog%20-%202028%20x%201365%20(3).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/673df0a77cbd454ee8e66ce6_MOIC%20-%20Blog%20-%202028%20x%201365%20(3).png"/></item><item><title>The $12M Polter Finance Hack: A Comprehensive Analysis | 51黑料网</title><link>/blog-posts/the-12m-polter-finance-hack-a-comprehensive-analysis</link><guid>/blog-posts/the-12m-polter-finance-hack-a-comprehensive-analysis</guid><description>DeFi promises financial autonomy and innovation by offering open and permissionless systems that eliminate intermediaries...</description><pubDate>Mon, 03 Feb 2025 19:37:22 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67475a5c679ac8f4304d2110_MOIC%20-%20Blog%20-%202028%20x%201365%20(8).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67475a5c679ac8f4304d2110_MOIC%20-%20Blog%20-%202028%20x%201365%20(8).png"/></item><item><title>Transforming Blockchain Security: 51黑料网鈥檚 AI Audit Agents | 51黑料网</title><link>/blog-posts/transforming-blockchain-security-auditones-ai-audit-agents</link><guid>/blog-posts/transforming-blockchain-security-auditones-ai-audit-agents</guid><description>In the rapidly evolving crypto space, trust and security are paramount. Smart contracts鈥攖he building blocks of decentralized finance (DeFi), NFTs...</description><pubDate>Mon, 03 Feb 2025 19:37:16 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/674f257417ad40fec718886c_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(35).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/674f257417ad40fec718886c_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(35).png"/></item><item><title>JackToken Audit: Solving a Critical DoS Problem | 51黑料网</title><link>/blog-posts/jacktoken-audit-solving-a-critical-dos-problem</link><guid>/blog-posts/jacktoken-audit-solving-a-critical-dos-problem</guid><description>With over 20 games, numerous partners, and annual revenues exceeding $100 million, FortuneJack is a leader in decentralized gaming...</description><pubDate>Mon, 03 Feb 2025 19:37:10 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6756c7704701e0a707ee9fb0_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(36).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6756c7704701e0a707ee9fb0_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(36).png"/></item><item><title>2024: A Year of Lessons in DeFi Security | 51黑料网</title><link>/blog-posts/2024-a-year-of-lessons-in-defi-security</link><guid>/blog-posts/2024-a-year-of-lessons-in-defi-security</guid><description>As DeFi protocols continue to redefine traditional financial systems, they have simultaneously become prime targets for malicious actors seeking to exploit vulnerabilities...</description><pubDate>Mon, 03 Feb 2025 19:37:03 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67597c45fb9e48b6177424df_MOIC%20-%20Blog%20-%202028%20x%201365%20(7).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67597c45fb9e48b6177424df_MOIC%20-%20Blog%20-%202028%20x%201365%20(7).png"/></item><item><title>CASE STUDY. DARK MYTHOS SECURED: RESOLVING REENTRANCY RISKS | 51黑料网</title><link>/blog-posts/case-study-dark-mythos-secured-resolving-reentrancy-risks</link><guid>/blog-posts/case-study-dark-mythos-secured-resolving-reentrancy-risks</guid><description>Fantasy trading card games and blockchain technology come together in Dark Mythos to deliver a unique gaming experience through NFT.</description><pubDate>Mon, 03 Feb 2025 19:36:56 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6762cac1ec26095872bf8b32_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(40).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6762cac1ec26095872bf8b32_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(40).png"/></item><item><title>Pros and Cons of Blockchain and AI Integrations | 51黑料网</title><link>/blog-posts/pros-and-cons-of-blockchain-and-ai-integrations</link><guid>/blog-posts/pros-and-cons-of-blockchain-and-ai-integrations</guid><description>Artificial Intelligence (AI) and blockchain are two technologies that are changing how we interact with data, systems, and each other. </description><pubDate>Mon, 03 Feb 2025 19:36:49 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67633355145464ff2fee50f3_MOIC%20-%20Blog%20-%202028%20x%201365%20(10).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/67633355145464ff2fee50f3_MOIC%20-%20Blog%20-%202028%20x%201365%20(10).png"/></item><item><title>Payy: Preventing Blacklist Exploits in Smart Contracts | 51黑料网</title><link>/blog-posts/payy-securing-their-smart-contracts</link><guid>/blog-posts/payy-securing-their-smart-contracts</guid><description>Payy is a platform designed to facilitate self-sovereign banking through cryptocurrency, offering a simplified and secure approach to the financial services traditionally managed by banks...</description><pubDate>Mon, 03 Feb 2025 19:36:40 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/677d12812f7a097b516c44e8_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(42).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/677d12812f7a097b516c44e8_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(42).png"/></item><item><title>Hyperliquid: A Comprehensive Look at Innovation, Growth, and Security Challenges in DeFi | 51黑料网</title><link>/blog-posts/hyperliquid-a-comprehensive-look-at-innovation-growth-and-security-challenges-in-defi</link><guid>/blog-posts/hyperliquid-a-comprehensive-look-at-innovation-growth-and-security-challenges-in-defi</guid><description>Hyperliquid has established itself as a key player in the decentralized finance (DeFi) ecosystem, offering innovative solutions through its proprietary Layer 1 blockchain...</description><pubDate>Mon, 03 Feb 2025 19:36:32 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6784fc413c1a53e8ec4a6a63_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(43).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6784fc413c1a53e8ec4a6a63_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(43).png"/></item><item><title>Securing TokenLabs: Protecting User Assets in a No-Code Token Ecosystem | 51黑料网</title><link>/blog-posts/case-study-securing-tokenlabs-protecting-user-assets-in-a-no-code-token-ecosystem</link><guid>/blog-posts/case-study-securing-tokenlabs-protecting-user-assets-in-a-no-code-token-ecosystem</guid><description>TokenLabs is a no-code platform designed to make creating and managing ERC20 tokens simple and accessible for users of all technical backgrounds...</description><pubDate>Mon, 03 Feb 2025 19:35:18 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6796704220d6ed6ebc212676_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(46).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6796704220d6ed6ebc212676_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(46).png"/></item><item><title>Missed by Auditors 鈥 Caught by AI: 6 Issues Spotted by Our Audit Assistant | 51黑料网</title><link>/blog-posts/missed-by-auditors---caught-by-ai-6-vulnerabilities-spotted-by-our-audit-assistant</link><guid>/blog-posts/missed-by-auditors---caught-by-ai-6-vulnerabilities-spotted-by-our-audit-assistant</guid><description>In the world of web3, smart contracts are the backbone of innovation, but they also come with risks...</description><pubDate>Wed, 15 Jan 2025 15:00:17 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6787be86258c207c9064e261_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(45).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6787be86258c207c9064e261_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(45).png"/></item><item><title>Preparing for the EU AI Act in 2025 | 51黑料网</title><link>/blog-posts/preparing-for-the-eu-ai-act-in-2025</link><guid>/blog-posts/preparing-for-the-eu-ai-act-in-2025</guid><description>As we approach 2025, the European Union鈥檚 landmark Artificial Intelligence Act (EU AI Act) is set to reshape the AI landscape for companies operating in the EU.</description><pubDate>Tue, 07 Jan 2025 11:27:23 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6761c36cf02371a487218e29_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(37).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6761c36cf02371a487218e29_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(37).png"/></item><item><title>DeFi Security Auditing Tools | 51黑料网</title><link>/blog-posts/defi-security-auditing-tools</link><guid>/blog-posts/defi-security-auditing-tools</guid><description>The crypto ecosystem thrives on innovation, efficiency, and decentralization, but the fast advancements occurring in the ecosystem bring unique security challenges such as...</description><pubDate>Mon, 25 Nov 2024 12:16:08 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/674464a009e429e0fa88e067_MOIC%20-%20Blog%20-%202028%20x%201365%20(5).png" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/674464a009e429e0fa88e067_MOIC%20-%20Blog%20-%202028%20x%201365%20(5).png"/></item><item><title>&quot;Book to Guide&quot;: How to Personalize Expert Knowledge And Decouple The Way We Read | 51黑料网</title><link>/blog-posts/building-a-smarter-future-how-miljn-is-transforming-knowledge-and-learning-with-ai</link><guid>/blog-posts/building-a-smarter-future-how-miljn-is-transforming-knowledge-and-learning-with-ai</guid><description>Interview with Olaf Birkner, CEO of MILJN</description><pubDate>Wed, 13 Nov 2024 19:18:46 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66f27fdd37de7acc02526a69_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(23).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/66f27fdd37de7acc02526a69_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(23).avif"/></item><item><title>What is on-chain monitoring? | 51黑料网</title><link>/blog-posts/what-is-on-chain-monitoring</link><guid>/blog-posts/what-is-on-chain-monitoring</guid><description>It is crucial to pay daily attention to security in Web3 infrastructure. A question that often arises is, what is the longest duration DeFi can go without a hack? In Q3 of 2023, hackers stole $700</description><pubDate>Wed, 13 Nov 2024 18:14:41 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246d9163e7f2caf0dfa3_65426b2a1d2a3a775b8aa9bc_What%2520is%2520on-chain%2520monitoring%2520%2520(2).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246d9163e7f2caf0dfa3_65426b2a1d2a3a775b8aa9bc_What%2520is%2520on-chain%2520monitoring%2520%2520(2).avif"/></item><item><title>Five Post-Deployment Security Measures | 51黑料网</title><link>/blog-posts/five-post-deployment-security-measures</link><guid>/blog-posts/five-post-deployment-security-measures</guid><description>Everyone wants to enjoy their gains from an investment, but the only way to enjoy profits is to have a safe web3, so safety should be all of our business, right?</description><pubDate>Wed, 13 Nov 2024 18:13:33 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246835dbf187bd42ef89_65838db7b284fdbbe2014c4f_Five%2520Post%2520Deployment%2520Security%2520Measures.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6646246835dbf187bd42ef89_65838db7b284fdbbe2014c4f_Five%2520Post%2520Deployment%2520Security%2520Measures.avif"/></item><item><title>Smart Contract Auditor Journey | 51黑料网</title><link>/blog-posts/smart-contract-auditor-journey</link><guid>/blog-posts/smart-contract-auditor-journey</guid><description>Smart contracts are the backbone of Web3, and numerous decentralized applications, ranging from financial services to gaming...</description><pubDate>Wed, 13 Nov 2024 18:09:26 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6655b3c315dee66792abab07_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(11).avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/6655b3c315dee66792abab07_Case%20Study%20-%20Blog%20-%202028%20x%201365%20(11).avif"/></item><item><title>Can AI Replace Human Auditors? | 51黑料网</title><link>/blog-posts/can-ai-replace-human-auditors</link><guid>/blog-posts/can-ai-replace-human-auditors</guid><description>Even though typical auditing approaches entail manual code review, recent breakthroughs in AI, specifically OpenAI&#39;s ChatGPT 3 and 4, have raised the question, &quot;Can AI replace human auditors?&quot;鈥</description><pubDate>Wed, 13 Nov 2024 17:53:42 GMT</pubDate><media:content url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624672ef8129e10b86c70_645cbea324a3e90e249e62bf_Can%2520AI%2520replace%2520human%2520auditors.avif" medium="image"/><media:thumbnail url="https://cdn.prod.website-files.com/662683880ac411fbd9ec07e1/664624672ef8129e10b86c70_645cbea324a3e90e249e62bf_Can%2520AI%2520replace%2520human%2520auditors.avif"/></item></channel></rss>