When is a Safe not so safe?

multisigsafeconfigtool

Oct 27, 2025 • engn33r

A guide on exploiting audit competition math for fun & profit

misc

Sep 2, 2025 • Drastic Watermelon

Subset wiring and claim combination: the path to linear time GKR

cryptographyalgebrapolynomial

Aug 27, 2025 • flyingnobita

Verifying Computations Layer by Layer

cryptographyalgebrapolynomial

Jun 1, 2025 • teddav

Get to know our resident auditors who make yAudit special

resident-spotlight

May 19, 2025 • nexus

Compressing Computation One Bit at a Time

cryptographyalgebrapolynomial

May 1, 2025 • teddav

Folding and Merkle trees, understand the magic behind STARKs

cryptographyalgebrapolynomial

Mar 31, 2025 • teddav

From QR codes to ZK, discover how Reed-Solomon codes correct errors and secure digital communication

cryptographyalgebra

Feb 24, 2025 • teddav

𝔽₂ and Beyond: A Gentle Guide to Field Extensions

cryptographyalgebra

Feb 13, 2025 • teddav

A small detail influencing major cryptographic libraries

cryptographyRFC6979

Jan 14, 2025 • Oba

An analysis of the security aspects of Account Abstraction

ERC4337account abstraction

Sep 9, 2024 • adriro

Newsflash - single points of failure can fail

L2sequencer

Aug 19, 2024 • engn33r

Fixing a Smart Contract Security Blind Spot

security-pipeline

Jun 14, 2024 • engn33r

Price Data is Hard - Part 1

oraclesuniswap-v3

May 24, 2024 • engn33r

Summarizing economic implications for good designs

economics

May 3, 2024 • engn33r

Detecting Incorrect Interface Definitions (in Vyper!)

vyper

Apr 19, 2024 • engn33r

yAudit Logo

Copyright © 2025 yAudit. All rights reserved.