Uniswap's constant product x*y=k explained: why product instead of sum, IL as selling volatility, JIT liquidity on V3 concentrated liquidity, and amountOutMinimum against sandwich attacks.
ERC-8128 emerged as a standard for proving the origin of AI agent communications when agents handle crypto assets. Walks through ERC and message signing basics, how it differs from API keys and OAuth, and the implementation flow.
Techniques and defenses from the MINJA, InjecMEM, and ToxicSkills campaigns that poison AI agents’ memory files, and the fact that GPT-5.3-Codex achieved a 72% exploit success rate on EVMbench released by OpenAI and Paradigm. This article organizes how AI becomes both a target of attacks and a weapon for attackers.