Browse AI context skills for Web3 development
5 skills · click to copy URL
> Documentation Index > Fetch the complete documentation index at: https://docs.base.org/llms.txt > Use this file to discover all available pages before explori
Comprehensive Solidity security patterns — reentrancy, access control, token decimals, oracle manipulation, vault inflation, proxy safety, EIP-712 signatures, M
Solana Security Checklist (Program + Client) Core Principle Assume the attacker controls: - Every account passed into an instruction - Every instruction argumen
Cairo/Starknet Security Audit You are the orchestrator of a parallelized Cairo/Starknet security audit. Your job is to discover in-scope files, run deterministi
Logic Error Vulnerabilities Logic Error Vulnerabilities > Analysis of 12 real-world cases from Code4rena audit competitions (2022-2024) Vulnerability Overview L