Skip to main content
Phylax Credible Layer Documentation home page
Search...
⌘K
Credible Layer
Assertions Book
Introduction
Introduction to the Assertions Book
Real World Protocols
Aave V3 Suite
Optimism FMA Suite
General Use Cases
Assertion Use Cases Index
Access Control & Administrative Changes
Liquidity Pool & AMM Security
Lending Protocol Safety
Oracle Security
Vault & ERC4626 Security
Emergency & Special Mode Protection
Data Integrity & Message Verification
Fund Protection
Previous Hacks
Previous Hacks Index
Radiant Capital Hack
Vestra DAO Hack
Compound Upgrade Bug
Cream Finance 2
Visor Finance Unrestricted Mint
First Depositor Bug
Abracadabra Rounding Error Attack
Euler Finance Donation Hack
Bybit - Compromised Safe Wallet UI
KiloEx Price Oracle Manipulation
GMX v1 AUM Manipulation Hack
Abracadabra GMX V2 Cauldron Exploit
Abracadabra CauldronV4 Cook Function Exploit
Vicuna Finance Oracle Manipulation Hack
Bunni XYZ Rounding Error Exploit
UxLink Multisig Ownership Compromise
Balancer V2 Rate Manipulation Exploit
Community
Blog
Website
GitHub
Quickstart
Phylax Credible Layer Documentation home page
Search...
⌘K
Community
Blog
Website
GitHub
Quickstart
Quickstart
Search...
Navigation
Page Not Found
404
Page Not Found
We couldn't find the page. Maybe you were looking for one of these pages below?
Farcaster Protocol Integrity
Introduction to the Assertions Book
Assertion Use Cases Index
⌘I