DEV Community

# defi

General discussions about the Decentralized Finance ecosystem.

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
How to Add Token Swaps to Your Rust Backend

How to Add Token Swaps to Your Rust Backend

Comments
8 min read
5 Ways to Monitor Token Prices Across 46 EVM Chains

5 Ways to Monitor Token Prices Across 46 EVM Chains

Comments
8 min read
How to Build an AI Trading Agent with Swap API

How to Build an AI Trading Agent with Swap API

Comments
8 min read
How to Add Cross-Chain Swaps to a Go Microservice

How to Add Cross-Chain Swaps to a Go Microservice

Comments
8 min read
Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Stablecoin Settlement: How We Replace 2-3 Day Card Settlement with Seconds

Comments
2 min read
How Crypto Lending Actually Works Under the Hood: A Developer's Perspective

How Crypto Lending Actually Works Under the Hood: A Developer's Perspective

Comments
4 min read
Designing MEV Resistance Into a Compounding Liquidity Engine: The AFX Approach

Designing MEV Resistance Into a Compounding Liquidity Engine: The AFX Approach

Comments
4 min read
The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

The AI Exploit Agent: How Autonomous AI Discovers DeFi Vulnerabilities at $0.50/Attempt — And 6 Defense Patterns

Comments
9 min read
The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

The Proxy Upgrade Kill Switch: Why OWASP SC10 Means Your Upgradeable Contract Is Exploitable

Comments
6 min read
7 Best Crypto APIs for Next.js and React DeFi Apps

7 Best Crypto APIs for Next.js and React DeFi Apps

Comments
7 min read
The DGLD Cross-Chain Minting Exploit: How an OP Stack Bridge Vulnerability Let Attackers Print Gold-Backed Tokens From Nothing

The DGLD Cross-Chain Minting Exploit: How an OP Stack Bridge Vulnerability Let Attackers Print Gold-Backed Tokens From Nothing

1
Comments
6 min read
The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

The $1,800 Hostile Takeover: How Governance Attacks Are the Cheapest Exploit in DeFi — And 7 Defense Patterns That Actually Work

1
Comments
9 min read
The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

The $679K BCE Burn Exploit: How a Defective Burn Mechanism Drained a PancakeSwap Pool

1
Comments
6 min read
The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

The Custom Detector Arms Race: Building Slither, Aderyn, and Semgrep Rules That Catch the Vulnerability Patterns Default Scanners Miss

Comments
9 min read
Omnistealer: How Blockchain-Embedded Malware Turns TRON, Aptos, and BSC Into an Unkillable C2

Omnistealer: How Blockchain-Embedded Malware Turns TRON, Aptos, and BSC Into an Unkillable C2

Comments
6 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.