Skip to main content
Phylax Credible Layer Documentation home page
Search...
⌘K
Credible Layer
Assertions Book
Introduction
Introduction to the Assertions Book
Real World Protocols
Aave V3 Suite
Optimism FMA Suite
Previous Hacks
Previous Hacks Index
Radiant Capital Hack
Vestra DAO Hack
Compound Upgrade Bug
Cream Finance 2
Visor Finance Unrestricted Mint
First Depositor Bug
Abracadabra Rounding Error Attack
Euler Finance Donation Hack
Bybit - Compromised Safe Wallet UI
KiloEx Price Oracle Manipulation
GMX v1 AUM Manipulation Hack
Abracadabra GMX V2 Cauldron Exploit
Abracadabra CauldronV4 Cook Function Exploit
Vicuna Finance Oracle Manipulation Hack
Bunni XYZ Rounding Error Exploit
UxLink Multisig Ownership Compromise
Balancer V2 Rate Manipulation Exploit
General Use Cases
Assertion Use Cases Index
Access Control & Administrative Changes
Implementation Address Change
KYC Whitelist Assertion
Owner Change
Timelock Verification
Liquidity Pool & AMM Security
Constant Product
Price Within Ticks
Fee Calculations
Lending Protocol Safety
Lending Health Factor
Liquidation Health Factor
Sum of all positions
Tokens Borrowed Invariant
Oracle Security
Oracle Liveness Validation
TWAP Deviation
Intra-tx Oracle Deviation
Vault & ERC4626 Security
ERC4626 Assets to Shares
ERC4626 Vault Deposit and Withdrawal
Harvest Increases Balance
Emergency & Special Mode Protection
Emergency State Validation
Fund Protection
ERC20 Drain
Ether Drain
Data Integrity & Message Verification
Farcaster Protocol Integrity
Use Case Mapping
Introduction
Function Call Inputs
Read Logs
Storage Lookup
Variable State Change Tracking
Call Frame Context
Unsupported
Community
Blog
Website
GitHub
Quickstart
Phylax Credible Layer Documentation home page
Search...
⌘K
Ask AI
Community
Blog
Website
GitHub
Quickstart
Quickstart
Search...
Navigation
Page Not Found
404
Page Not Found
We couldn't find the page. Maybe you were looking for one of these pages below?
Farcaster Protocol Integrity
Introduction to the Assertions Book
Assertion Use Cases Index