← Back to Home

Field Notes

Short, practical writeups on audits, verification, and cryptographic systems engineering.

CURRENT_RELEASES

Latest research notes

03 Jan 2026 6 min read

Verified Model-Based Conformance Testing for Dummies

How a small, proved model plus a differential fuzzer catches deep logic bugs normally missed by tests.

FuzzingFormal MethodsTestingVerification
01 Jan 2026 12 min read

Lean for Security Proofs, Part 3: Enforcing the Proof in Rust

A minimal Rust system that mirrors Lean invariants and keeps them enforced in code and tests.

LeanFormal MethodsRustSecurity Proofs
29 Dec 2025 8 min read

The $220 Million Rounding Error: Why "Security" Failed Cetus (and How to Fix It)

A postmortem-style breakdown of how rounding, invariants, and unchecked assumptions turn into catastrophic losses.

Incident ReviewSecurity EngineeringSmart Contracts
20 Dec 2025 11 min read

Fuzz Testing Playbook: Finding Security Bugs Before Attackers Do

An in-depth guide to building high-signal fuzzing programs for security-critical systems.

FuzzingSecurity EngineeringTesting
12 Dec 2025 2 min read

Zero-Knowledge Circuits: Verification Checklist for Production Teams

A practical, production-minded checklist for verifying ZK circuits before deployment.

ZKVerificationFormal Methods
10 Dec 2025 11 min read

Lean for Security Proofs, Part 2: Escrow Invariants in Practice

A more realistic Lean model with pending payouts, limits, and conservation proofs.

LeanFormal MethodsSecurity ProofsExamples
05 Dec 2025 9 min read

Lean for Security Proofs, Part 1: A Practical Starting Point

Why Lean belongs in a security workflow and how to start modeling real invariants.

LeanFormal MethodsSecurity Proofs
05 Nov 2025 3 min read

Assurance Notes: Threat Modeling for Cryptographic APIs

A compact checklist for abuse cases, side channels, and key lifecycle risks in crypto interfaces.

Threat ModelingCryptographyAssurance