Skip to main content
Phylax Credible Layer Documentation home page
Search...
⌘K
Credible Layer
Assertions Book
Introduction
Introduction to the Assertions Book
Real World Protocols
Aave V3 Suite
Optimism FMA Suite
Previous Hacks
Previous Hacks Index
Balancer V2 Rate Manipulation Exploit
Bybit - Compromised Safe Wallet UI
GMX v1 AUM Manipulation Hack
Abracadabra GMX V2 Cauldron Exploit
Abracadabra CauldronV4 Cook Function Exploit
Bunni XYZ Rounding Error Exploit
Radiant Capital Hack
UxLink Multisig Ownership Compromise
KiloEx Price Oracle Manipulation
Vestra DAO Hack
Vicuna Finance Oracle Manipulation Hack
Euler Finance Donation Hack
Abracadabra Rounding Error Attack
Visor Finance Unrestricted Mint
First Depositor Bug
Compound Upgrade Bug
Cream Finance 2
General Use Cases
Assertion Use Cases Index
Access Control & Administrative Changes
Implementation Address Change
KYC Whitelist Assertion
Owner Change
Timelock Verification
Liquidity Pool & AMM Security
Constant Product
Price Within Ticks
Fee Calculations
Lending Protocol Safety
Lending Health Factor
Liquidation Health Factor
Sum of all positions
Tokens Borrowed Invariant
Oracle Security
Oracle Liveness Validation
TWAP Deviation
Intra-tx Oracle Deviation
Vault & ERC4626 Security
ERC4626 Assets to Shares
ERC4626 Vault Operations
Harvest Increases Balance
Emergency & Special Mode Protection
Emergency State Validation
Fund Protection
ERC20 Drain
Ether Drain
Use Case Mapping
Introduction
Function Call Inputs
Read Logs
Storage Lookup
Variable State Change Tracking
Call Frame Context
Unsupported
Community
Blog
Website
GitHub
Quickstart
Phylax Credible Layer Documentation home page
Search...
⌘K
Ask AI
Community
Blog
Website
GitHub
Quickstart
Quickstart
Search...
Navigation
Page Not Found
404
Page Not Found
We couldn't find the page. Maybe you were looking for one of these pages below?
Introduction
Call Frame Context
Assertion Use Cases Index
⌘I