
Consensys’ Linea integrates Phylax’s Credible Layer to block smart-contract exploits at the protocol level
Read Our Expert Analysis
Create an account or login for free to unlock our expert analysis and key takeaways for this development.
By continuing, you agree to receive marketing communications and our weekly newsletter. You can opt-out at any time.
Recommended for you

Cecuro’s specialized AI flags 92% of exploited DeFi contracts
A domain-focused security agent from Cecuro identified vulnerabilities tied to most exploited DeFi contracts in an open benchmark, covering far more loss value than a GPT-5.1-based baseline. The public dataset and evaluation show tailored review processes and heuristics materially lift detection compared with general coding agents.

StarkWare brings EY’s Nightfall privacy layer to Starknet to enable confidential institutional transactions
StarkWare has integrated EY’s Nightfall privacy layer into Starknet , enabling private-by-default institutional payments, treasury moves and tokenized-asset transfers while preserving onchain settlement and auditability. The deployment combines zero-knowledge rollups with enterprise credential bindings and positions Starknet alongside other privacy L2 efforts — each using different technical trade-offs such as privacy pools, zk anchors, and wallet compatibility — increasing choices for regulated actors but also raising common regtech and governance questions.



