<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>DARKNAVY</title>
    <link>https://www.darknavy.org/</link>
    <description>Recent content on DARKNAVY</description>
    <image>
      <title>DARKNAVY</title>
      <url>https://www.darknavy.org/images/white_logo.png</url>
      <link>https://www.darknavy.org/images/white_logo.png</link>
    </image>
    <generator>Hugo -- 0.160.1</generator>
    <language>en</language>
    <lastBuildDate>Mon, 13 Apr 2026 00:00:00 +0000</lastBuildDate>
    <atom:link href="https://www.darknavy.org/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Contract Auditor</title>
      <link>https://www.darknavy.org/web3/skills/contract-auditor/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/skills/contract-auditor/</guid>
      <description>DFS-based multi-agent Solidity audit with adversarial validation</description>
    </item>
    <item>
      <title>Client Auditor</title>
      <link>https://www.darknavy.org/web3/skills/client-auditor/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/skills/client-auditor/</guid>
      <description>7-stage orchestrated audit for blockchain node codebases (Go, Rust, C/C&#43;&#43;)</description>
    </item>
    <item>
      <title>Exploit Investigator</title>
      <link>https://www.darknavy.org/web3/skills/exploit-investigator/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/skills/exploit-investigator/</guid>
      <description>Multi-agent pipeline for on-chain attack analysis with Analyst-Validator debate loop</description>
    </item>
    <item>
      <title>Hyperbridge ISMP Forged Proof DOT Mint</title>
      <link>https://www.darknavy.org/web3/exploits/hyperbridge-ismp-forged-proof-dot-mint/</link>
      <pubDate>Mon, 13 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/hyperbridge-ismp-forged-proof-dot-mint/</guid>
      <description>On April 13, 2026 at 03:55:23 UTC, a helper contract deployed by the attacker used Hyperbridge&amp;#39;s Ethereum-side ISMP message path to deliver a forged governance-style `PostRequest` into `TokenGateway`. The exploit is best classified as an access-control failure at the proof-validation boundary: `Hand...</description>
    </item>
    <item>
      <title>SubQuery Settings Access Control Staking Drain</title>
      <link>https://www.darknavy.org/web3/exploits/subquery-settings-access-control-staking-drain/</link>
      <pubDate>Sun, 12 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/subquery-settings-access-control-staking-drain/</guid>
      <description>On April 12, 2026, SubQuery Network, a staking protocol on Base, (block 44,590,469) suffered an access-control exploit that drained approximately **218.29M SQT** (about **$131.2K**) from the protocol&amp;#39;s Staking contract. The attacker deployed two ephemeral contracts, abused the absence of any owner o...</description>
    </item>
    <item>
      <title>Denaria Finance Virtual AMM Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/denaria-finance-virtual-amm-manipulation/</link>
      <pubDate>Sun, 05 Apr 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/denaria-finance-virtual-amm-manipulation/</guid>
      <description>On April 5, 2026, Denaria Finance, a perpetual DEX on Linea, (block 30,067,821) suffered a virtual AMM manipulation attack that drained approximately **165,618 USDC** from the protocol&amp;#39;s Vault. The attacker flash-loaned 60,000 USDC from Aave V3, deployed pairs of ephemeral LP and Trader contracts, a...</description>
    </item>
    <item>
      <title>InfinitySix TWAP Stale Price</title>
      <link>https://www.darknavy.org/web3/exploits/infinitysix-twap-stale-price/</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/infinitysix-twap-stale-price/</guid>
      <description>Two compounding flaws in InfinitySix&amp;#39;s (`$i6`) BSC staking contract were chained to extract **273,802 USDT** in block 89,703,286. The contract credits referral bonuses to a sponsor&amp;#39;s withdrawable balance immediately upon the referral&amp;#39;s `invest()` call; separately, its TWAP oracle enforces a 1-minute...</description>
    </item>
    <item>
      <title>LML APower Reward-Claim Price Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/lml-apower-reward-claim-price-manipulation/</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/lml-apower-reward-claim-price-manipulation/</guid>
      <description>On March 31, 2026 at 20:39:02 UTC, the attacker used flash-loaned capital on BNB Chain to manipulate the LML/USDT market, then batch-triggered reward claims for pre-seeded accounts through APower and immediately sold the resulting LML back into the distorted pool. The primary issue is a price-manipu...</description>
    </item>
    <item>
      <title>WhaleBit CES/IGT Staking Oracle Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/whalebit-ces-igt-staking-oracle-manipulation/</link>
      <pubDate>Tue, 31 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/whalebit-ces-igt-staking-oracle-manipulation/</guid>
      <description>On March 31, 2026 at 22:56:21 UTC (Polygon block `84938872`), an attacker exploited WhaleBit&amp;#39;s unverified staking system through a **same-transaction spot-oracle manipulation** funded by a flash loan. The attacker EOA `0xe66b37de57b65691b9f4ac48de2c2b7be53c5c6f` used helper contract `0xb5a8d7a37d60a...</description>
    </item>
    <item>
      <title>VTSwapHook Pricing Error</title>
      <link>https://www.darknavy.org/web3/exploits/vtswaphook-pricing-error/</link>
      <pubDate>Sat, 28 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/vtswaphook-pricing-error/</guid>
      <description>On 2026-03-28, the VTSwapHook contract (`0xbf4b4a83708474528a93c123f817e7f2a0637a88`) deployed on Arbitrum was exploited through a **logic error** in its custom pricing formula. The hook implements a nonlinear (logarithm-based) price curve but approximates execution price using a simple midpoint ave...</description>
    </item>
    <item>
      <title>EST BNBDeposit Claim Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/est-bnbdeposit-claim-manipulation/</link>
      <pubDate>Fri, 27 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/est-bnbdeposit-claim-manipulation/</guid>
      <description>On 2026-03-27, the EST / BNBDeposit system on BNB Smart Chain was exploited through a **flash-loan-assisted reward-accounting flaw** in `BNBDeposit`, amplified by **fee-exempt routing and pair-state manipulation** in EST. The attacker borrowed `250,000 WBNB`, built a temporary claim-bearing share in...</description>
    </item>
    <item>
      <title>Cyrus Price Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/cyrus-price-manipulation/</link>
      <pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/cyrus-price-manipulation/</guid>
      <description>On March 22, 2026, the CyrusTreasury protocol on BNB Chain was exploited through a price manipulation attack against its `withdrawUSDTFromAny` function, which is called internally by `exit()`. The vulnerable contract (`CyrusTreasury`, `0xb042ea7b35826e6e537a63bb9fc9fb06b50ae10b`) reads the live Panc...</description>
    </item>
    <item>
      <title>Escrow Overflow</title>
      <link>https://www.darknavy.org/web3/exploits/escrow-overflow/</link>
      <pubDate>Sun, 22 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/escrow-overflow/</guid>
      <description>An unverified escrow-like contract at `0xf0a105d93eec8781e15222ad754fcf1264568c97` on Ethereum Mainnet was fully drained in block 24,707,679 (timestamp 2026-03-22 UTC) through an **integer overflow** in its deposit function `0x317de4f6`. The deposit function accumulates entry amounts into a running ...</description>
    </item>
    <item>
      <title>dTRINITY dLEND Index Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/dtrinity-dlend-index-manipulation/</link>
      <pubDate>Wed, 18 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/dtrinity-dlend-index-manipulation/</guid>
      <description>On 2026-03-18, the dTRINITY dLEND lending protocol (an Aave v3 fork deployed on Ethereum mainnet) was exploited through a **flash loan abuse combined with a logic error** in the flash loan repayment accounting. An attacker manipulated the cbBTC reserve&amp;#39;s liquidity index from ~1.0 RAY to 6,226,622 RA...</description>
    </item>
    <item>
      <title>KToken Redeem Logic Flaw</title>
      <link>https://www.darknavy.org/web3/exploits/ktoken-redeem-logic-flaw/</link>
      <pubDate>Tue, 17 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/ktoken-redeem-logic-flaw/</guid>
      <description>On 2026-03-17 (block 30488585), a lending protocol deployed on Polygon zkEVM (chain ID 1101) was attacked through a logic error in its Compound-fork KToken implementation. The vulnerability is in internal function `0x3dff` (`redeemFresh`): when `redeemUnderlying()` is called, the function (1) comput...</description>
    </item>
    <item>
      <title>USDC Permit Phishing Drain</title>
      <link>https://www.darknavy.org/web3/exploits/usdc-permit-phishing-drain/</link>
      <pubDate>Mon, 16 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/usdc-permit-phishing-drain/</guid>
      <description>**Transaction**: `0xfd7417af8433e3d9bcbed3f965307c800a24eb4e98f42cebfab6ca6064f5a642` **Chain**: Ethereum Mainnet (Chain ID 1) **Block**: 24671606 **Date**: 2026-03-16 17:38:59 UTC **Incident Name**: `usdc-permit-phishing-drain`</description>
    </item>
    <item>
      <title>Venus Lending Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/venus-lending-exploit/</link>
      <pubDate>Sun, 15 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/venus-lending-exploit/</guid>
      <description>On BNB Smart Chain, an attacker exploited Venus Protocol&amp;#39;s vTHE (THENA/THE) market by combining three pre-obtained approvals with a classic exchange-rate inflation technique. The attacker held ERC-20 `transferFrom` allowances for the THE token from six victim addresses and a Comptroller `approvedDel...</description>
    </item>
    <item>
      <title>AM Burn Reserve Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/am-burn-reserve-manipulation/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/am-burn-reserve-manipulation/</guid>
      <description>On March 12, 2026 (BSC block 86066209), attacker EOA `0x0b9a1391269e95162bfec8785e663258c209333b` exploited a combination of the AM token&amp;#39;s fee-on-transfer burn mechanism and Moolah lending protocol&amp;#39;s collateralized borrowing to extract approximately **131,572 USDT** in profit.</description>
    </item>
    <item>
      <title>CoW Protocol Solver Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/cow-protocol-solver-exploit/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/cow-protocol-solver-exploit/</guid>
      <description>On March 12, 2026 (block 24,643,151), a victim address (`0x98b9d979`) lost approximately $50.4 million worth of Aave-wrapped USDT (aEthUSDT) on Ethereum mainnet through a two-transaction attack. In the primary transaction, a registered CoW Protocol solver (`0x3980daa7`) submitted a settlement execut...</description>
    </item>
    <item>
      <title>DBXen ERC2771 Confusion</title>
      <link>https://www.darknavy.org/web3/exploits/dbxen-erc2771-confusion/</link>
      <pubDate>Thu, 12 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/dbxen-erc2771-confusion/</guid>
      <description>The DBXen protocol on BNB Chain was exploited at block 86,063,902 through an ERC2771 meta-transaction context confusion vulnerability in the `burnBatch()` function. The attacker abused the inconsistency between `_msgSender()` (used in the `gasWrapper` modifier) and `msg.sender` (passed as the `user`...</description>
    </item>
    <item>
      <title>Gamma Lending Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/gamma-lending-exploit/</link>
      <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/gamma-lending-exploit/</guid>
      <description>On March 11, 2026, the Gamma Protocol (a Compound-fork lending platform formerly known as Planet Finance) on BNB Chain was exploited for approximately **7,882 USDT** via a logic flaw in the publicly-callable `updateUserDiscount()` function. The attacker leveraged a flash-loaned USDT position to repe...</description>
    </item>
    <item>
      <title>Planet Finance Lending</title>
      <link>https://www.darknavy.org/web3/exploits/planet-finance-lending/</link>
      <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/planet-finance-lending/</guid>
      <description>On 2026-03-11, a failed attempt was made to exploit Planet Finance, a Compound-fork lending protocol on BNB Smart Chain, via an oracle price manipulation attack. Transaction `0x330ccbfa...` was initiated by attacker EOA `0x2eb7c45f` but **reverted** with status `0x0`, consuming 38,751,495 of 40,000,...</description>
    </item>
    <item>
      <title>Wukong Staking Reentrancy</title>
      <link>https://www.darknavy.org/web3/exploits/wukong-staking-reentrancy/</link>
      <pubDate>Wed, 11 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/wukong-staking-reentrancy/</guid>
      <description>On 2026-03-11, the WUKONG staking protocol on BNB Chain was exploited via a classic reentrancy attack against its `unstake()` function in the `StakingUpgradeableV10` implementation. The vulnerability arises because `unstake()` sends BNB to the caller (via a low-level `call`) **before** updating the ...</description>
    </item>
    <item>
      <title>Alkemi Self-Liquidation</title>
      <link>https://www.darknavy.org/web3/exploits/alkemi-self-liquidation/</link>
      <pubDate>Tue, 10 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/alkemi-self-liquidation/</guid>
      <description>On March 10, 2026, an attacker exploited the `liquidateBorrow` function of the Alkemi Earn Public lending protocol on Ethereum mainnet (block 24,626,979) to self-liquidate their own solvent position. The root cause is a compound vulnerability: `liquidateBorrow` lacks both a self-liquidation guard (`...</description>
    </item>
    <item>
      <title>Gondi PurchaseBundler Drain</title>
      <link>https://www.darknavy.org/web3/exploits/gondi-purchasebundler-drain/</link>
      <pubDate>Mon, 09 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/gondi-purchasebundler-drain/</guid>
      <description>On 2026-03-09, the `PurchaseBundler` contract (`0xc10472ac`) deployed on Ethereum (block 24618641) was exploited through an access control bypass in its `executeSell` function. The attacker (`0x8d171c74`) used a purpose-built contract (`0xe95e3cfc`) to call `executeSell` 81 times, successfully drain...</description>
    </item>
    <item>
      <title>MOLT EVM Weak Spawner Access Control</title>
      <link>https://www.darknavy.org/web3/exploits/molt-evm-weak-spawner-access-control/</link>
      <pubDate>Sun, 08 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/molt-evm-weak-spawner-access-control/</guid>
      <description>On 2026-03-08 at 20:36 UTC (Base block 43093167), an attacker exploited a trivially bypassable `onlySpawnerToken` modifier on the MoltEVM token contract (`0x225da3d879d379ff6510c1cc27ac8535353f501f`) to mint 100,000,000 mEVM tokens at zero cost. The modifier requires only that the caller is a contra...</description>
    </item>
    <item>
      <title>SOLV BRO Double Mint</title>
      <link>https://www.darknavy.org/web3/exploits/solv-bro-double-mint/</link>
      <pubDate>Thu, 05 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/solv-bro-double-mint/</guid>
      <description>On March 5, 2026, Solv Protocol&amp;#39;s Bitcoin Reserve Offering on Ethereum was exploited through a callback-driven logic error in the BRO wrapper at `0x15f7c1ac69f0c102e4f390e45306bd917f21cfcf`, accessed through the beacon proxy at `0x014e6f6ba7a9f4c9a51a0aa3189b5c0a21006869`. The vulnerable full-value ...</description>
    </item>
    <item>
      <title>When an AI Assistant Becomes Part of the Hacker’s Attack Chain | Security Analysis of Doubao Phone</title>
      <link>https://www.darknavy.org/blog/security_analysis_of_doubao_phone/</link>
      <pubDate>Wed, 04 Mar 2026 11:30:34 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/security_analysis_of_doubao_phone/</guid>
      <description>&lt;p&gt;When a phone starts “taking action” on its own, it’s no longer just answering questions like how to get a cheaper takeout—it can actually open apps, compare prices, and place orders. Control shifts from the user’s fingers to an intelligent agent capable of seeing the screen, planning, and executing tasks.&lt;/p&gt;
&lt;p&gt;Launched at the end of 2025, the Doubao Phone Assistant (hereafter &lt;strong&gt;Doubao Assistant&lt;/strong&gt;) was the first to hand over the phone’s full operational chain to an AI agent. It uses a large language model as the central decision-making unit, combined with GUI Agent technology, to understand user intentions, break down tasks, plan paths, and execute complex cross-app and cross-scenario operations with system-level capabilities.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Base Multi-Contract Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/base-multi-contract-exploit/</link>
      <pubDate>Wed, 04 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/base-multi-contract-exploit/</guid>
      <description>**Transaction:** `0xe94a5ed54d0a9aa317c997607d7d1ea9828ad47626d7794b0e4020ff49cdf9a0` **Chain:** Base (Chain ID: 8453) **Block:** 42832267 **Date of Analysis:** 2026-03-04 **Debate Round:** 1</description>
    </item>
    <item>
      <title>Inugami Staking Reward Debt Drain</title>
      <link>https://www.darknavy.org/web3/exploits/inugami-staking-reward-debt-drain/</link>
      <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/inugami-staking-reward-debt-drain/</guid>
      <description>On March 3, 2026, the Inugami staking contract on BNB Chain (`0x2001144a0485b0b3748a167848cdd73837345d73`) was exploited via a logic error in reward-debt initialization. The attacker staked a small amount of LP, sent 1 wei WBNB to reactivate the reward window, and then claimed legacy rewards that sh...</description>
    </item>
    <item>
      <title>Uniswap V4 Hook Swap Drain</title>
      <link>https://www.darknavy.org/web3/exploits/uniswap-v4-hook-swap-drain/</link>
      <pubDate>Tue, 03 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/uniswap-v4-hook-swap-drain/</guid>
      <description>On March 3, 2026 (block 24,575,085), the UniswapV4Router04 contract at `0x00000000000044a361ae3cac094c9d1b14eece97` on Ethereum mainnet was exploited via an authorization bypass vulnerability in its `swap(bytes,uint256)` function. The root cause is a hardcoded calldata offset in an inline assembly a...</description>
    </item>
    <item>
      <title>sDOLA LlamaLend Oracle Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/sdola-llamalend-oracle-manipulation/</link>
      <pubDate>Mon, 02 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/sdola-llamalend-oracle-manipulation/</guid>
      <description>On March 2, 2026 at 03:00:11 UTC (block 24566937), an attacker exploited an oracle misconfiguration in the Curve LlamaLend sDOLA/crvUSD market on Ethereum. The root cause was the `CryptoFromPoolVaultWAgg` oracle contract (`0x88822ee5`) calling `sDOLA.convertToAssets()` as a spot price feed, which co...</description>
    </item>
    <item>
      <title>BUBU2 Fee Token Staking Drain</title>
      <link>https://www.darknavy.org/web3/exploits/bubu2-fee-token-staking-drain/</link>
      <pubDate>Sun, 01 Mar 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/bubu2-fee-token-staking-drain/</guid>
      <description>On March 1, 2026, the BUBU2/WBNB PancakeSwap pair on BNB Chain (block 83,955,808) was drained by flash-loan sandwiching a permissionlessly-triggerable burn mechanism inside the BUBU2 token contract.</description>
    </item>
    <item>
      <title>Movie Token Burn Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/movie-token-burn-manipulation/</link>
      <pubDate>Sat, 28 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/movie-token-burn-manipulation/</guid>
      <description>On 2026-02-28 (BSC block 85677691), the Movie Token ($MT) project was exploited for approximately **381.75 WBNB (~$242K USD)** in a single transaction. The attacker abused the MT token&amp;#39;s `extractFromPoolForLpMining` function, which burns tokens directly from the PancakeSwap MT/WBNB LP pair&amp;#39;s balance...</description>
    </item>
    <item>
      <title>Aave Fork Undercollateralized Borrow</title>
      <link>https://www.darknavy.org/web3/exploits/aave-fork-undercollateralized-borrow/</link>
      <pubDate>Thu, 26 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/aave-fork-undercollateralized-borrow/</guid>
      <description>On February 26, 2026, an attacker exploited a misconfigured Aave V3 fork lending pool on Ethereum mainnet (block 24,538,897). The root cause was a deployment-time oracle misconfiguration in the `AaveOracle` contract at `0x9dce7a180c34203fee8ce8ca62f244feeb67bd30`, where the constructor arguments con...</description>
    </item>
    <item>
      <title>HPay Staking ForceExit Drain</title>
      <link>https://www.darknavy.org/web3/exploits/hpay-staking-forceexit-drain/</link>
      <pubDate>Wed, 25 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/hpay-staking-forceexit-drain/</guid>
      <description>On February 25, 2026, the HPAY staking contract on BNB Chain (BSC) was exploited via a logic error in the unverified staking implementation at `0xbe189fe9f84ca531cd979630e1f14757b88dd80d`, accessed through the TransparentUpgradeableProxy at `0x6e30c17d2554dca5a1ac178939764c6bf61ab95a`. The `forceExi...</description>
    </item>
    <item>
      <title>STO Deflationary Burn Drain</title>
      <link>https://www.darknavy.org/web3/exploits/sto-deflationary-burn-drain/</link>
      <pubDate>Mon, 23 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/sto-deflationary-burn-drain/</guid>
      <description>On February 23, 2026, the STO Protocol token on BNB Chain was exploited via a logic error in its deflationary sell-burn mechanism. The STO token&amp;#39;s `_executePendingSellBurn()` function burns previously sold tokens from the PancakeSwap pair and calls `sync()` to update reserves mid-transfer, allowing ...</description>
    </item>
    <item>
      <title>TARA DODO CoopPool Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/tara-dodo-cooppool-exploit/</link>
      <pubDate>Sun, 22 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/tara-dodo-cooppool-exploit/</guid>
      <description>An attacker on Ethereum mainnet (block 24,513,601) drained the TARA cross-chain bridge by exploiting a compromised bridge validator key. The vulnerability is an **access control failure**: the TARA light client contract (`0xcdf14446`) accepted ECDSA-signed bridge state submissions from any registere...</description>
    </item>
    <item>
      <title>Veil Cash Groth16 Forgery</title>
      <link>https://www.darknavy.org/web3/exploits/veil-cash-groth16-forgery/</link>
      <pubDate>Fri, 20 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/veil-cash-groth16-forgery/</guid>
      <description>On February 20, 2026, the Veil Cash privacy protocol on Base was exploited for 2.9 ETH (~$5.69K) through a zero-knowledge proof forgery attack. The root cause is a misconfigured Groth16 SNARK verifier contract at `0x1e65c075989189e607ddafa30fa1a0001c376cfd` where the delta verification key parameter...</description>
    </item>
    <item>
      <title>Fee Token Skim Exploit</title>
      <link>https://www.darknavy.org/web3/exploits/fee-token-skim-exploit/</link>
      <pubDate>Mon, 16 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/fee-token-skim-exploit/</guid>
      <description>On BSC (BNB Smart Chain) block 81,556,796 (2026-02-16 12:51:23 UTC), an attacker exploited a fee-on-transfer token&amp;#39;s built-in auto-liquidity mechanism to drain value from its PancakeSwap V2 liquidity pair. The vulnerable component is VictimToken (`0x02739be625f7a1cb196f42dceee630c394dd9faa`), an ERC...</description>
    </item>
    <item>
      <title>Uniswap Router Approval Abuse</title>
      <link>https://www.darknavy.org/web3/exploits/uniswap-router-approval-abuse/</link>
      <pubDate>Fri, 13 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/uniswap-router-approval-abuse/</guid>
      <description>A custom, unverified swap router contract at `0xc87c815c03b6cd45880cbd51a90d0a56ecfba9da` on Ethereum mainnet contains a critical access control flaw that allows any caller to execute token swaps using another user&amp;#39;s token approvals. On February 13, 2026 at 17:06:47 UTC (block 24,449,245), an attack...</description>
    </item>
    <item>
      <title>ERC1155 Bonding Curve Reentrancy</title>
      <link>https://www.darknavy.org/web3/exploits/erc1155-bonding-curve-reentrancy/</link>
      <pubDate>Sun, 08 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/erc1155-bonding-curve-reentrancy/</guid>
      <description>On 2026-02-08 12:06:47 UTC (block 24,411,960), tx `0x7b3878969c2f44dae5e47d7c03616d5f17dfc46ea59ea75f135c468709a59ce7` on Ethereum drained four Decent.xyz &amp;#34;Crescendo&amp;#34; ERC1155 bonding curve contracts of nearly all their ETH reserves via reentrancy through the native ETH refund path in `buy()` and the...</description>
    </item>
    <item>
      <title>USDe Safe Module Flashloan</title>
      <link>https://www.darknavy.org/web3/exploits/usde-safe-module-flashloan/</link>
      <pubDate>Sat, 07 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/usde-safe-module-flashloan/</guid>
      <description>On 2026-02-07 (Ethereum mainnet, block 24,406,366), an attacker used a Balancer Vault flash loan callback to trigger a Gnosis Safe module at `0xf5e48ff26c60f3d2bdc0b38a570ce6373a927e19`, which executed `execTransactionFromModule` on the Safe `0x635fa9b57a9888ffe624323e547fdfbad1a74606` with a `DELEG...</description>
    </item>
    <item>
      <title>NEUTRL nUSD Internal Balance</title>
      <link>https://www.darknavy.org/web3/exploits/neutrl-nusd-internal-balance/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/neutrl-nusd-internal-balance/</guid>
      <description>On Ethereum mainnet, transaction `0x047fcfa2cfb51879f19769dd25e2768be42985f9c2d8f483f2a0c18703834061` (2026-02-04 13:49:23 UTC) used a Morpho flash loan to route through Pendle’s NUSD Standardized Yield (SY) integration and drain NUSD, then swap to USDC. The attacker’s EOA `0x1f36068728b86ae4d65249f...</description>
    </item>
    <item>
      <title>reUSD SingleAdapterRouter Withdraw</title>
      <link>https://www.darknavy.org/web3/exploits/reusd-singleadapterrouter-withdraw/</link>
      <pubDate>Wed, 04 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/reusd-singleadapterrouter-withdraw/</guid>
      <description>On 2026-02-04 13:46:59 UTC (block 24,383,881), tx `0xee2b216b7d649513dc8ba102e130d3d86d189b393a0d5f387e479be3dbda799d` on Ethereum deployed helper contracts and invoked `depositWithCalldataMultiToken` and `withdrawWithCalldataMultiToken` on SingleAdapterRouter (Vault_reUSD) at `0x169a5effcae91ab33bc...</description>
    </item>
    <item>
      <title>EYWA PortalV2 Axelar</title>
      <link>https://www.darknavy.org/web3/exploits/eywa-portalv2-axelar/</link>
      <pubDate>Sun, 01 Feb 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/eywa-portalv2-axelar/</guid>
      <description>On 2026-02-01 18:38:23 UTC (block 24,363,854), tx `0x37d9b911ef710be851a2e08e1cfc61c2544db0f208faeade29ee98cc7506ccc2` on Ethereum called `expressExecute` on ReceiverAxelar (`0xb2185950f5a0a46687ac331916508aada202e063`) with `sourceChain=&amp;#34;berachain&amp;#34;` and `sourceAddress=0x5eEdDcE72530e4fC96d43E3d70Fe...</description>
    </item>
    <item>
      <title>Gyro Finance CCIP Escrow</title>
      <link>https://www.darknavy.org/web3/exploits/gyro-finance-ccip-escrow/</link>
      <pubDate>Fri, 30 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/gyro-finance-ccip-escrow/</guid>
      <description>On Ethereum mainnet, Gyro Finance&amp;#39;s GYD bridge escrow was exploited on January 30, 2026. The attacker used a crafted CCIP message to make the escrow contract approve unlimited GYD allowance, then drained the escrow via `transferFrom`.</description>
    </item>
    <item>
      <title>XPL</title>
      <link>https://www.darknavy.org/web3/exploits/xpl/</link>
      <pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/xpl/</guid>
      <description>The transaction `0x9779341b2b80ba679c83423c93ecfc2ebcec82f9f94c02624f83d8a647ee2e49` on BNB Smart Chain exploited XPlayer&amp;#39;s node distribution burn path to manipulate the XPL/USDT PancakeSwap pool and drain USDT. The attacker used a flash-loan style contract to burn XPL out of the pool, forcing reser...</description>
    </item>
    <item>
      <title>Makina Oracle Manipulation</title>
      <link>https://www.darknavy.org/web3/exploits/makina-oracle-manipulation/</link>
      <pubDate>Tue, 20 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/makina-oracle-manipulation/</guid>
      <description>The attacker used flash‑loaned USDC (Morpho &#43; Aave) to temporarily skew spot‑based on‑chain state (Curve pools and oracle inputs, including the ERC4626 convertToAssets path used in pricing). In the same transaction, they invoked accountForPosition and updateTotalAum, locking an inflated AUM into las...</description>
    </item>
    <item>
      <title>FutureSwap</title>
      <link>https://www.darknavy.org/web3/exploits/futureswap/</link>
      <pubDate>Sat, 10 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/futureswap/</guid>
      <description>On 2026-01-10 08:30:35 UTC (Arbitrum block 419,829,771), tx `0xe1e6aa5332deaf0fa0a3584113c17bedc906148730cbbc73efae16306121687b` deployed an attacker contract that drained approximately 394,743 USDC.e from FutureSwap&amp;#39;s unverified perpetual exchange contract at `0xf7ca7384cc6619866749955065f17bedd3ed...</description>
    </item>
    <item>
      <title>TMX Tribe</title>
      <link>https://www.darknavy.org/web3/exploits/tmx-tribe/</link>
      <pubDate>Mon, 05 Jan 2026 00:00:00 +0000</pubDate>
      <guid>https://www.darknavy.org/web3/exploits/tmx-tribe/</guid>
      <description>The unverified contracts of TMXTribe were exploited by a series of attack transactions exploiting a vulnerability in the accounting logic. The root cause is that the AUM calculation (used to price TLP) ignores USDG liabilities, so USDG minting inflates AUM and enables high‑price redemptions.</description>
    </item>
    <item>
      <title>How And Why We Hacked Cypherock Hardware Wallet: The Full Story</title>
      <link>https://www.darknavy.org/blog/how_and_why_we_hacked_cypherock_hardware_wallet_the_full_story/</link>
      <pubDate>Fri, 21 Nov 2025 15:47:08 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/how_and_why_we_hacked_cypherock_hardware_wallet_the_full_story/</guid>
      <description>&lt;p&gt;On blockchains, whoever controls the private key to an address controls the funds in the corresponding account.&lt;/p&gt;
&lt;p&gt;In October 2025, the U.S. government announced the seizure of &lt;strong&gt;127,000 BTC&lt;/strong&gt; from Prince Group. On‑chain tracing reports indicated that these funds were in fact the assets stolen from the &lt;em&gt;LuBian&lt;/em&gt; mining pool in December 2020.&lt;/p&gt;
&lt;p&gt;A Bitcoin private key is a 256‑bit random number and is, in theory, infeasible to brute‑force. How did the U.S. government obtain &lt;em&gt;LuBian&lt;/em&gt;&amp;rsquo;s wallet private key?&lt;/p&gt;</description>
    </item>
    <item>
      <title>About</title>
      <link>https://www.darknavy.org/about/</link>
      <pubDate>Tue, 14 Oct 2025 16:33:58 +0800</pubDate>
      <guid>https://www.darknavy.org/about/</guid>
      <description>&lt;p&gt;&lt;strong&gt;DARKNAVY&lt;/strong&gt;, headquartered in Singapore and Shanghai, is an independent cybersecurity research and services organization. We are pioneers in &lt;strong&gt;AVSS&lt;/strong&gt; (Adversarial Vulnerability Scoring System) and &lt;strong&gt;quantitative security&lt;/strong&gt;, as well as the founding team behind the international hacking competition &lt;a href=&#34;https://geekcon.top/&#34;&gt;GEEKCON&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Founded upon the legacy of KeenTeam, established in 2011 and globally recognized as a multiple world-record holder and international hacking competition champion, DARKNAVY inherits over a decade of cutting-edge security research experience across operating systems, chipsets, AI, mobile, IoT, and Web3. Guided by the founding team&amp;rsquo;s unique vision, we have built a collaborative research team dedicated to solving the most critical security challenges faced by our clients.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Argusee: A Multi-Agent Collaborative Architecture for Automated Vulnerability Discovery</title>
      <link>https://www.darknavy.org/blog/argusee_a_multi_agent_collaborative_architecture_for_automated_vulnerability_discovery/</link>
      <pubDate>Fri, 23 May 2025 11:09:50 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/argusee_a_multi_agent_collaborative_architecture_for_automated_vulnerability_discovery/</guid>
      <description>&lt;p&gt;As we envisioned in &lt;strong&gt;&lt;a href=&#34;https://www.darknavy.org/darknavy_insight/the_most_imaginative_new_applications_of_2024/&#34;&gt;DARKNAVY INSIGHT | The Most Imaginative New Applications of 2024&lt;/a&gt;&lt;/strong&gt;:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;The next generation of AI agents will have excellent reasoning and generalization abilities and be skilled at using a variety of security research tools, inheriting a wealth of human expert knowledge. They will be able to discover more 0-day vulnerabilities in the real world, like top security experts.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Unsurprisingly, as Large Language Models (LLMs) demonstrate increasing proficiency in handling complex tasks, Agent technology is emerging as a new paradigm in the field of vulnerability discovery. Since Google Project Zero released Naptime[1] last year, an increasing number of Agent-based auditing tools are appearing. By providing LLMs with the necessary toolsets and source code for testing, these tools simulate the behaviour of security researchers to perform code audits and vulnerability confirmation.&lt;/p&gt;</description>
    </item>
    <item>
      <title>If the Person Who Finds a Web3 Hardware Wallet is a Hacker</title>
      <link>https://www.darknavy.org/blog/if_the_person_who_finds_a_web3_hardware_wallet_is_a_hacker/</link>
      <pubDate>Sun, 30 Mar 2025 10:00:52 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/if_the_person_who_finds_a_web3_hardware_wallet_is_a_hacker/</guid>
      <description>&lt;p&gt;In 2024, Web3 security incidents caused by private key leaks have surged, resulting in estimated financial losses exceeding $855 million.&lt;/p&gt;
&lt;p&gt;Private keys function as the sole credentials for blockchain accounts, controlling access to all associated on-chain assets like cryptocurrencies and NFTs. Due to the decentralized nature of blockchain, losing the private key means permanently losing account control, while leakage typically results in asset theft. &lt;strong&gt;Hardware wallets&lt;/strong&gt;, utilizing techniques like offline private key storage and secure chips, have become the primary choice for asset protection.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Jailbroken Unitree Robot Dog</title>
      <link>https://www.darknavy.org/darknavy_insight/the_jailbroken_unitree_robot_dog/</link>
      <pubDate>Fri, 28 Mar 2025 10:00:17 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_jailbroken_unitree_robot_dog/</guid>
      <description>&lt;p&gt;The history of humanity&amp;rsquo;s domestication of wolves has spanned forty thousand years – we used firelight and patience to soften the wildness in their eyes, transforming their fangs into the loyalty that guards our homes.&lt;/p&gt;
&lt;p&gt;When various robot dogs created by America&amp;rsquo;s Boston Dynamics and China&amp;rsquo;s Unitree Robotics leap and flip gracefully under the spotlight, this ancient symbiotic relationship seems to take on a new meaning in the cyber age: trust that once required thousands of years of genetic selection to build can now be achieved with just a line of code.&lt;/p&gt;</description>
    </item>
    <item>
      <title>A First Glimpse of the Starlink User Ternimal</title>
      <link>https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/</link>
      <pubDate>Wed, 26 Mar 2025 10:10:22 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;I think the human race has no future if it doesn&amp;rsquo;t go to space. —— Stephen Hawking&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Starlink is a low Earth orbit (LEO) satellite internet service provided by SpaceX. Users connect to near-Earth orbit satellites through a user terminal, which then connects to the internet via ground gateways.&lt;/p&gt;
&lt;p&gt;&lt;img alt=&#34;Basic architecture of the Starlink system [1]&#34; loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/blog/a_first_glimpse_of_the_starlink_user_ternimal/attachments/d48521bc-861b-4050-82df-1366d6bc01d2.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;As the new generation of satellites gradually incorporates laser links, some satellites can communicate with each other via laser. This both reduces reliance on ground stations and improves transmission efficiency, enhancing global coverage.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Reconstructing the $1.5 Billion Bybit Hack by North Korean Actors</title>
      <link>https://www.darknavy.org/darknavy_insight/reconstructing_the_1.5_billion_bybit_hack_by_north_korean_actors/</link>
      <pubDate>Mon, 24 Mar 2025 15:34:29 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/reconstructing_the_1.5_billion_bybit_hack_by_north_korean_actors/</guid>
      <description>&lt;blockquote&gt;
&lt;p&gt;Both the Attackers and Victims Made Critical Mistakes&lt;/p&gt;
&lt;/blockquote&gt;
&lt;hr&gt;
&lt;p&gt;On February 21, 2025, the cryptocurrency exchange Bybit experienced the most significant financial loss in Web3 history when nearly $1.5 billion was illicitly transferred from its multi-signature wallet by North Korean threat actors.&lt;/p&gt;
&lt;p&gt;The DARKNAVY team has been closely monitoring security developments within the Web3 ecosystem. Following the Bybit incident, we conducted a reconstruction of the attack, analyzing it from the perspectives of the attackers, the developers, and the transaction signers.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Fatal Vulnerabilities Compromising DJI Control Devices</title>
      <link>https://www.darknavy.org/blog/fatal_vulnerabilities_compromising_dji_control_devices/</link>
      <pubDate>Fri, 21 Mar 2025 10:01:19 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/fatal_vulnerabilities_compromising_dji_control_devices/</guid>
      <description>&lt;p&gt;As logistics drones weave through buildings and surveying equipment delineates urban landscapes, the capillaries of the low-altitude economy are sketching the future with millimeter-level precision.&lt;/p&gt;
&lt;p&gt;DARKNAVY consistently focuses on the construction and breaching of drone security defenses. In this research, we discovered &lt;strong&gt;a fatal exploit chain in DJI remote control devices&lt;/strong&gt;, leading to the complete compromise of the security defenses within the DJI remote controller. How can we assist industry leader DJI in fortifying its security defenses? What potential risks do these vulnerabilities reveal? Welcome to read this article.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Stealthy Manipulator of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_stealthy_manipulator_of_2024/</link>
      <pubDate>Mon, 17 Feb 2025 18:00:44 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_stealthy_manipulator_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_stealthy_manipulator_of_2024/attachments/753c3b01-4bca-4261-a25e-9ca62e49ccdd.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the era of mobile internet, user traffic is the lifeline of manufacturers. In this battle for traffic, smartphone manufacturers hold the most overwhelming advantage — ultimate control over the operating system. By deeply customizing AOSP, manufacturers not only gain precise control over user and app activities but can even manipulate and interfere with user choices.&lt;/p&gt;
&lt;p&gt;Ordinarily, few companies would choose to violate regulations and abuse their privileges to harm consumers. However, in 2024, a well-known Chinese smartphone brand crossed the ethical bottom line of business. By leveraging non-security technological means, it covertly manipulated its own smartphone system, turning millions of users into mere tools for profit.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Frustrating Vulnerability Disclosure of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_frustrating_vulnerability_disclosure_of_2024/</link>
      <pubDate>Sun, 16 Feb 2025 17:58:16 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_frustrating_vulnerability_disclosure_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_frustrating_vulnerability_disclosure_of_2024/attachments/aeedebd0-4b36-41e5-9fdf-dd2fc2705432.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the field of cybersecurity, vulnerability disclosure has long been regarded as a crucial step in safeguarding users. However, in practice, this process is fraught with controversy and contradictions. What truly constitutes &amp;ldquo;responsible disclosure&amp;rdquo;? When vendors dominate the public release of information and patch deployment, while security researchers invest substantial time and energy in negotiations, can this model still fulfill its intended purpose of protecting user security? In an era of rapidly advancing technology and escalating cyber threats, has the traditional vulnerability disclosure process become outdated?&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most &#34;Secure&#34; Defenders of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_secure_defenders_of_2024/</link>
      <pubDate>Sat, 15 Feb 2025 17:54:34 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_secure_defenders_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_secure_defenders_of_2024/attachments/c3723ecc-d423-40dc-8979-505749e10cd8.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the increasingly intense offense and defense confrontation of 2024, security software has always been regarded as an important cornerstone of the corporate security defense line. However, these security softwares themselves may also have vulnerabilities and could be exploited by attackers as a springboard for intrusions to harm users. Over the years, incidents caused by security software have raised a question — can security software really be trusted?&lt;/p&gt;
&lt;p&gt;The following is the &lt;strong&gt;eighth article&lt;/strong&gt; of the &lt;strong&gt;&amp;ldquo;DARKNAVY INSIGHT | 2024 Annual Security Report&amp;rdquo;&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Unstoppable Offensive and Defensive Trend of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_unstoppable_offensive_and_defensive_trend_of_2024/</link>
      <pubDate>Fri, 14 Feb 2025 17:47:00 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_unstoppable_offensive_and_defensive_trend_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_unstoppable_offensive_and_defensive_trend_of_2024/attachments/095a96a7-bef6-480c-94de-f572401425eb.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In recent years, the evolution of vulnerabilities and defense techniques has been continuous. From the days when a simple stack overflow could compromise a system, to the present day, where sophisticated techniques are necessary to bypass multiple layers of defense. The &amp;ldquo;shield&amp;rdquo; and the &amp;ldquo;spear&amp;rdquo; are in dynamic confrontation: whenever new defense measures are introduced, new attack methods emerge in response. The enhancement of defense mechanisms compels attackers to seek out new vulnerabilities, while the innovation of attack techniques propels the development of defense technologies&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Unfortunate Backdoor of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_unfortunate_backdoor_of_2024/</link>
      <pubDate>Thu, 13 Feb 2025 17:07:28 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_unfortunate_backdoor_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_unfortunate_backdoor_of_2024/attachments/474a4c83-4170-4512-bc3b-a8ec5de49be4.png&#34;&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Does open source guarantee that there are no backdoors?&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;At the 1983 Turing Award ceremony, Ken Thompson raised this question. As one of only three legends to win the Turing Award before the age of 40, he demonstrated how to hack Unix systems compiled from harmless source code by implanting backdoors in compilers, remaining a tale frequently cited by hackers to this day.&lt;/p&gt;
&lt;p&gt;In 2024, the XZ backdoor incident resurfaced this question. Under the nose of the open-source community, attackers successfully pushed the backdoored xz-utils 5.6.1 package into official repositories of several distributions like Debian and Fedora. Fortunately, engineer Andres Freund discovered and reported the abnormal behavior of xz-utils 5.6.1 in time. Although the community effectively stopped the backdoor&amp;rsquo;s spread, this heart-stopping crisis made every open-source user rethink the trust model in collaborative development.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Prominent Privacy Security Trend of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_prominent_privacy_security_trend_of_2024/</link>
      <pubDate>Wed, 12 Feb 2025 16:40:12 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_prominent_privacy_security_trend_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_prominent_privacy_security_trend_of_2024/attachments/ea604b12-e368-4ff5-baea-2b56979e34e5.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;At the beginning of 2025, the five-year &amp;ldquo;Siri Eavesdropping Scandal&amp;rdquo; finally came to an end. Apple settled a class-action lawsuit with the plaintiffs for $95 million.&lt;/p&gt;
&lt;p&gt;This well-known privacy case started when users accused Siri of accidentally capturing and recording their everyday conversations without permission, and leaking the data to third-party advertisers.&lt;/p&gt;
&lt;p&gt;Even though Apple firmly denied these claims, public concern over privacy security is growing day by day. &lt;strong&gt;Now, we share massive amounts of personal data with AI every day. Are these privacy data really secure enough?&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Maddest Vulnerability of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_maddest_vulnerability_of_2024/</link>
      <pubDate>Tue, 11 Feb 2025 11:41:45 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_maddest_vulnerability_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_maddest_vulnerability_of_2024/attachments/8671fafe-16f3-46b2-bf66-846bf748cc02.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Under the collective efforts of security researchers and increasingly stringent security mitigations, most memory vulnerabilities have been nipped in the bud.&lt;/p&gt;
&lt;p&gt;Is it time to declare memory vulnerabilities a thing of the past?&lt;/p&gt;
&lt;p&gt;In July 2024, a &amp;ldquo;nuclear bomb&amp;rdquo; from the Windows camp shattered the illusion of security. We can&amp;rsquo;t help but ask: When faced with threats from memory, just how much can the walls in front of us really defend against?&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Imaginative New Applications of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_imaginative_new_applications_of_2024/</link>
      <pubDate>Mon, 10 Feb 2025 11:25:50 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_imaginative_new_applications_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_imaginative_new_applications_of_2024/attachments/0127cf48-39e2-4864-bafc-4b2ce7a7cef1.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;2023 was the dawn of generative AI and large language models, which output content in unprecedented ways.&lt;/p&gt;
&lt;p&gt;In 2024, a large number of AI agents emerged, expanding the capabilities of LLM, driving more widespread tool usage, and extending their application to more fields.&lt;/p&gt;
&lt;p&gt;For security researchers, how to leverage AI to improve work efficiency, and even drive AI to think, analyze, and find vulnerabilities like humans, has become a key topic.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most &#34;Golden&#34; Bypass of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/</link>
      <pubDate>Sun, 09 Feb 2025 17:13:30 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/attachments/cover.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Since the early 2000s, attacks based on browser vulnerabilities have remained a mainstream, effective, and versatile attack method. The following is the second article from the &amp;ldquo;DARKNAVY INSIGHT | 2024 Annual Security Report&amp;rdquo;.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/attachments/2.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;According to the latest report from market research firm Statcounter, Chrome has unquestionably secured its position as the most dominant browser in terms of market share.&lt;/p&gt;
&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_golden_bypass_of_2024/attachments/085f2c36-5c81-4182-b887-93394febe001.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;Chrome is renowned for its exceptional security, with the Google security team continuously researching and implementing cutting-edge vulnerability mitigation mechanisms. One of the most well-known among them is MiraclePtr, designed to prevent attackers from exploiting Use-After-Free (UAF) vulnerabilities in the browser.&lt;/p&gt;</description>
    </item>
    <item>
      <title>The Most Groundbreaking New Security Ecosystem of 2024</title>
      <link>https://www.darknavy.org/darknavy_insight/the_most_groundbreaking_new_security_ecosystem_of_2024/</link>
      <pubDate>Sat, 08 Feb 2025 17:10:13 +0800</pubDate>
      <guid>https://www.darknavy.org/darknavy_insight/the_most_groundbreaking_new_security_ecosystem_of_2024/</guid>
      <description>&lt;p&gt;&lt;img loading=&#34;lazy&#34; src=&#34;https://www.darknavy.org/darknavy_insight/the_most_groundbreaking_new_security_ecosystem_of_2024/attachments/f349496e-e1f5-4d6b-b4a2-7c939b50aa80.png&#34;&gt;&lt;/p&gt;
&lt;p&gt;In the &amp;ldquo;DARKNAVY INSIGHT | 2023 Annual Security Report&amp;rdquo;, we noted: &amp;ldquo;As we stand on the precipice of the next decade, 2023 will undoubtedly be a year of profound transformation. The deployment of new defense mechanisms and the rise of novel attack technologies will fundamentally reshape the digital security landscape.&amp;rdquo;&lt;/p&gt;
&lt;p&gt;The year 2024 arrived like a swift gust of wind, only to fade away like a brief storm. The AI revolution, breakthroughs in mobile operating systems, and challenges in supply chain security that we discussed in 2023 continue to unfold in 2024, leaving little room to catch our breath.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2024-5274: A Minor Flaw in V8 Parser Leading to Catastrophes</title>
      <link>https://www.darknavy.org/blog/cve_2024_5274_a_minor_flaw_in_v8_parser_leading_to_catastrophes/</link>
      <pubDate>Fri, 30 Aug 2024 10:09:29 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/cve_2024_5274_a_minor_flaw_in_v8_parser_leading_to_catastrophes/</guid>
      <description>&lt;p&gt;In May of this year, we noticed that Chrome fixed a V8 vulnerability that was being exploited in the wild in &lt;a href=&#34;https://chromereleases.googleblog.com/2024/05/stable-channel-update-for-desktop_23.html&#34;&gt;this update&lt;/a&gt;. We quickly pinpointed the fix for this vulnerability and discovered that it was a rare bug in the Parser module, which piqued our interest greatly. This led to the following research.&lt;/p&gt;
&lt;h2 id=&#34;from-patch-to-poc&#34;&gt;From Patch to PoC&lt;/h2&gt;
&lt;p&gt;First, let&amp;rsquo;s take a look at the &lt;a href=&#34;https://chromium-review.googlesource.com/c/v8/v8/&amp;#43;/5553030&#34;&gt;patch&lt;/a&gt; for this vulnerability:&lt;/p&gt;
&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; class=&#34;chroma&#34;&gt;&lt;code class=&#34;language-diff&#34; data-lang=&#34;diff&#34;&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gh&#34;&gt;diff --git a/src/ast/scopes.cc b/src/ast/scopes.cc
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gh&#34;&gt;index 660fdd2e9ad..de4df35c0ad 100644
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gd&#34;&gt;--- a/src/ast/scopes.cc
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gi&#34;&gt;+++ b/src/ast/scopes.cc
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gu&#34;&gt;@@ -2447,7 +2447,7 @@ bool Scope::MustAllocate(Variable* var) {
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;     var-&amp;gt;set_is_used();
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;     if (inner_scope_calls_eval_ &amp;amp;&amp;amp; !var-&amp;gt;is_this()) var-&amp;gt;SetMaybeAssigned();
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   }
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gd&#34;&gt;-  DCHECK(!var-&amp;gt;has_forced_context_allocation() || var-&amp;gt;is_used());
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gi&#34;&gt;+  CHECK(!var-&amp;gt;has_forced_context_allocation() || var-&amp;gt;is_used());
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   // Global variables do not need to be allocated.
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   return !var-&amp;gt;IsGlobalObjectProperty() &amp;amp;&amp;amp; var-&amp;gt;is_used();
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt; }
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gh&#34;&gt;diff --git a/src/parsing/parser-base.h b/src/parsing/parser-base.h
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gh&#34;&gt;index 40914d39a4f..65c338f343f 100644
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gd&#34;&gt;--- a/src/parsing/parser-base.h
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gi&#34;&gt;+++ b/src/parsing/parser-base.h
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gu&#34;&gt;@@ -2661,6 +2661,7 @@ typename ParserBase&amp;lt;Impl&amp;gt;::BlockT ParserBase&amp;lt;Impl&amp;gt;::ParseClassStaticBlock(
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   }
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   FunctionState initializer_state(&amp;amp;function_state_, &amp;amp;scope_, initializer_scope);
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;&lt;span class=&#34;gi&#34;&gt;+  FunctionParsingScope body_parsing_scope(impl());
&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   AcceptINScope accept_in(this, true);
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;
&lt;/span&gt;&lt;/span&gt;&lt;span class=&#34;line&#34;&gt;&lt;span class=&#34;cl&#34;&gt;   // Each static block has its own var and lexical scope, so make a new var
&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;p&gt;The patch is very simple, the actual effective fix is just one line of code. This line introduces a variable of type &lt;code&gt;FunctionParsingScope&lt;/code&gt; when parsing the &lt;a href=&#34;https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Classes/Static_initialization_blocks&#34;&gt;static initialization block&lt;/a&gt; of a class. Let&amp;rsquo;s examine what this newly introduced variable does:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploiting Steam: Usual and Unusual Ways in the CEF Framework</title>
      <link>https://www.darknavy.org/blog/exploiting_steam_usual_and_unusual_ways_in_the_cef_framework/</link>
      <pubDate>Thu, 27 Jun 2024 11:39:32 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/exploiting_steam_usual_and_unusual_ways_in_the_cef_framework/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Chromium Embedded Framework (CEF) is an open-source framework that allows developers to embed the Chromium engine in their applications. Although CEF is widely employed in a range of popular software, including WeChat and the Epic Games Launcher, there has been little security research on it. In this article, we will use the Steam Client Browser (a CEF-based application) as an example to present the vulnerabilities we found and how we exploited them to build three Remote Code Execution (RCE) chains.&lt;/p&gt;</description>
    </item>
    <item>
      <title>AVSS Report: System Security Adversarial Capability Preliminary Evaluation of iOS, Android, and HarmonyOS - Kernel</title>
      <link>https://www.darknavy.org/blog/avss_report_kernel/</link>
      <pubDate>Tue, 11 Jun 2024 15:40:57 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/avss_report_kernel/</guid>
      <description>&lt;p&gt;As consumers, when faced with five different brands and models of smartphones or ten different smart cars, it&amp;rsquo;s difficult for us to determine which one can effectively prevent our privacy from being stolen or maliciously accessed, such as our location or even hearing our conversations inside the car.&lt;/p&gt;
&lt;p&gt;Even as ordinary consumers, we currently have no way of knowing. As technology professionals who have long studied in APT(Advanced Persistent Threat) attacks, we understand that these devices can ultimately be compromised in the face of advanced persistent attacks.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Strengthening the Shield: MTE in Heap Allocators</title>
      <link>https://www.darknavy.org/blog/strengthening_the_shield_mte_in_memory_allocators/</link>
      <pubDate>Wed, 03 Jan 2024 16:19:13 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/strengthening_the_shield_mte_in_memory_allocators/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;In 2018, with the release of ARMv8.5-A, a brand new chip security feature &lt;a href=&#34;https://developer.arm.com/-/media/Arm%20Developer%20Community/PDF/Arm_Memory_Tagging_Extension_Whitepaper.pdf&#34;&gt;MTE&lt;/a&gt; (Memory Tagging Extensions) emerged. Five years later, in 2023, the first smartphone to support this feature was released — &lt;a href=&#34;https://blog.google/products/pixel/google-pixel-8-pro/&#34;&gt;Google Pixel 8&lt;/a&gt; — marking the official entry of MTE into the consumer market. Although this feature is not yet enabled by default, developers can &lt;a href=&#34;https://googleprojectzero.blogspot.com/2023/11/first-handset-with-mte-on-market.html&#34;&gt;turn it on&lt;/a&gt; themselves for testing.&lt;/p&gt;
&lt;p&gt;As a powerful defense against memory corruption, there has not yet been a comprehensive analysis of MTE&amp;rsquo;s defensive boundaries, capabilities, and its impact on performance on the internet. Previously, Google Project Zero published a series of &lt;a href=&#34;https://googleprojectzero.blogspot.com/2023/08/mte-as-implemented-part-1.html&#34;&gt;articles about MTE&lt;/a&gt;, focusing on the more low-level security aspects of MTE. However, the actual impact of MTE on real software security remains a mystery. To discuss this topic, heap allocators provide an excellent starting point. Heap memory corruption issues have gradually become the mainstream type of binary vulnerabilities. For reference, see the &lt;a href=&#34;https://github.com/microsoft/MSRC-Security-Research/blob/master/presentations/2019_09_CppCon/CppCon2019%20-%20Killing%20Uninitialized%20Memory.pdf&#34;&gt;presentation&lt;/a&gt; by MSRC at CppCon 2019:&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploiting the libwebp Vulnerability, Part 2: Diving into Chrome Blink</title>
      <link>https://www.darknavy.org/blog/exploiting_the_libwebp_vulnerability_part_2/</link>
      <pubDate>Fri, 03 Nov 2023 14:10:17 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/exploiting_the_libwebp_vulnerability_part_2/</guid>
      <description>&lt;h2 id=&#34;introduction&#34;&gt;Introduction&lt;/h2&gt;
&lt;p&gt;When we examine a third-party library vulnerability in a real environment, we often encounter numerous complex variables that exist within the vulnerability&amp;rsquo;s context. Exploiting such a vulnerability is not as easy as one might imagine.&lt;/p&gt;
&lt;p&gt;Here is the information we know:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The overflowed variable &lt;a href=&#34;https://source.chromium.org/chromium/chromium/src/&amp;#43;/d53886d694334f194b267db3af165e5cd61ef489:third_party/libwebp/src/src/dec/vp8l_dec.c;l=437&#34;&gt;huffman_tables&lt;/a&gt;, has a size of 0x2f28.&lt;/li&gt;
&lt;li&gt;The heap chunk is allocated in the renderer&amp;rsquo;s ThreadPool, while most objects are allocated in the main thread.&lt;/li&gt;
&lt;li&gt;We can write a partially controlled 4-byte integer with an offset that is a multiple of 8 bytes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In Chrome, different-sized heap chunks are stored in separate buckets, isolating objects of different sizes to ensure &lt;strong&gt;security&lt;/strong&gt;. Typically, achieving heap exploitation in Chrome requires identifying objects of the same size for layout purposes and then utilizing Use-After-Free (UAF) or Out-of-Bounds (OOB) techniques to manipulate other objects, leading to information disclosure or control-flow hijacking. In the following, we will share the objects we have discovered, as well as attempting to bypass this mechanism.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Exploiting the libwebp Vulnerability, Part 1: Playing with Huffman Code</title>
      <link>https://www.darknavy.org/blog/exploiting_the_libwebp_vulnerability_part_1/</link>
      <pubDate>Fri, 03 Nov 2023 14:10:12 +0800</pubDate>
      <guid>https://www.darknavy.org/blog/exploiting_the_libwebp_vulnerability_part_1/</guid>
      <description>&lt;h2 id=&#34;vulnerability-localization&#34;&gt;Vulnerability Localization&lt;/h2&gt;
&lt;p&gt;In the initial phase of vulnerability analysis, due to the absence of readily available PoCs or detailed analysis reports, we first attempted to read and understand the &lt;a href=&#34;https://github.com/webmproject/libwebp/commit/902bc9190331343b2017211debcec8d2ab87e17a&#34;&gt;patch code&lt;/a&gt; for CVE-2023-4863 in the upstream repository of webmproject/libwebp. However, the WebM Project&amp;rsquo;s official patch was relatively complex, making it difficult for us to accurately pinpoint the root cause of the vulnerability.&lt;/p&gt;
&lt;p&gt;Thus, we turned our attention to Apple&amp;rsquo;s official patch for CVE-2023-41064, and performed a comparison of the ImageIO framework before and after the update using BinDiff. We noticed that Apple&amp;rsquo;s patch involved fewer code changes and was much easier to understand.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
