Signature Replay in Account Abstraction Wallets
Nonce architecture, domain separation, and policy-gate controls for replay resilience in AA environments.
Security Research
A curated set of practical security deep dives for Web3 teams. Read in order or jump directly to the risk area you are working on.
A practical overview of wallet risk taxonomy and the Prevent → Detect → Respond model used across the rest of these articles.
Read article →Nonce architecture, domain separation, and policy-gate controls for replay resilience in AA environments.
Allowance risk model, detection rules, and revoke workflows for approval-driven drain scenarios.
Scoped capabilities, TTL boundaries, revocation architecture, and delegated execution telemetry.
Practical incident-response sequence for containment, investigation, and recovery under pressure.
A practical revoke playbook to prioritize risky approvals and execute safe revocation lanes.
Practical controls to reduce Permit2 phishing risk with policy gating, telemetry, and rapid response workflows.
How to harden pairing, session scope, and revocation controls to reduce WalletConnect session abuse.
How to reduce catastrophic governance risk with independent signer models, timelocks, and response playbooks.
A practical operations model for signer hardening, deterministic transaction review, and rapid containment.
A practical operations playbook for confidence scoring, bounded execution, and oracle incident recovery.
A practical defense playbook to secure source-to-CDN delivery paths before malicious wallet prompts reach users.
Operational controls for reducing sandwich attack harm with slippage governance, route policy, and rapid incident containment.
An operations-focused defense model for bridge message verification, delay-queue controls, replay resilience, and incident containment.
A practical model for pause authority, trigger policy, scoped containment, and governance-safe recovery in live incidents.
A practical model to prevent hidden upgrade paths with segmented change lanes, queue integrity gates, and bounded emergency controls.
A practical deployment safety model using invariant telemetry, canary risk budgets, and deterministic containment triggers.
A practical control model for validator-set compromise with segmented trust domains, policy-gated attestations, and staged halt governance.
A practical operations model for RPC trust-tier routing, deterministic response validation, and staged poisoning containment.
A practical model for baseline policy, change gates, runtime drift telemetry, and staged containment of trust expansion risk.
Useful reads outside the core wallet sequence. We can expand this block with new bridge/infrastructure/governance investigations as they publish.
A practical runbook for containment, queue control, validator coordination, and safe bridge recovery.
Technical analysis of exploit mechanics and monitoring response patterns.
Operational threat patterns for social-engineering-driven wallet compromise.