Skip to content

Commit ab3fd5f

Browse files
authored
feat: update wonderland xyz domain (#107)
- Replaced old defi.sucks links for wonderland.xyz - Replaced old defi.sucks for wonderland.xyz in the 'Repo Readiness' section.
1 parent 570c9f6 commit ab3fd5f

6 files changed

Lines changed: 11 additions & 11 deletions

File tree

sites/wonderland/blog/2022-12-26-oracle-manipulation-101-math-edition.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ This article is divided into two.
1515

1616
In the first part, we will present a quick refresher on how Uniswap works specifically tailored to the needs of computing manipulation costs. It'll explore how to move the spot price in an AMM to the desired target for Uniswap v2 and v3.
1717

18-
The second part will show how we obtained the results from the ["Oracle Manipulation 101"](https://defi.sucks/insights/oracle-manipulation-101) article. To do so, we will present step-by-step an attack of a lending protocol in DeFi. This case can be later generalized to different types of markets.
18+
The second part will show how we obtained the results from the ["Oracle Manipulation 101"](https://wonderland.xyz/insights/oracle-manipulation-101) article. To do so, we will present step-by-step an attack of a lending protocol in DeFi. This case can be later generalized to different types of markets.
1919

2020
You can follow along with the simulations provided in this [colab](https://colab.research.google.com/drive/1RwpF-lKq968mvsyL0jgyw9rO_cTqYxPl?usp=sharing).
2121

@@ -265,11 +265,11 @@ You can gain more by playing around at [this link](https://colab.research.google
265265
266266
## Oracle Manipulation 101 Math
267267

268-
In the [Oracle Manipulation 101 article](https://defi.sucks/insights/oracle-manipulation-101), we have presented a study case for an oracle manipulation analysis. In particular, we have explained how an attack on a lending market can become profitable. This section will show how many of the results we have presented were derived.
268+
In the [Oracle Manipulation 101 article](https://wonderland.xyz/insights/oracle-manipulation-101), we have presented a study case for an oracle manipulation analysis. In particular, we have explained how an attack on a lending market can become profitable. This section will show how many of the results we have presented were derived.
269269

270270
As a brief rundown, attacks will likely happen if the profit from manipulation exceeds the cost of manipulation. Understanding this is fundamental to setting the parameters that allow for capital efficiency without adding new risks.
271271

272-
The Cost of Manipulation refers to the capital used ti borrow + capital used to move an AMM's price to the desired target. The latter is what we deduced in the Uniswap Math section above, both for Uniswap v2 and v3. As mentioned in [Oracle Manipulation 101](https://defi.sucks/insights/oracle-manipulation-101), we will consider Full Range positions for this analysis, which is consistent with our previous claims about concentrated positions.
272+
The Cost of Manipulation refers to the capital used ti borrow + capital used to move an AMM's price to the desired target. The latter is what we deduced in the Uniswap Math section above, both for Uniswap v2 and v3. As mentioned in [Oracle Manipulation 101](https://wonderland.xyz/insights/oracle-manipulation-101), we will consider Full Range positions for this analysis, which is consistent with our previous claims about concentrated positions.
273273

274274
We will exclude trading fees for simplicity of reading, but you can trivially add them to the analysis.
275275

sites/wonderland/blog/2022-12-26-oracle-manipulation-101.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -104,7 +104,7 @@ Before PoS, for relevant enough markets, manipulating the price back to the init
104104

105105
Let's assume that the attacker knows that arbitrage will happen and that the pool has a Full Range position with liquidity $L$. In this situation, the best plan is to borrow as much as possible (sell high) using the capital obtained from the manipulation. They could then swap the difference for a price close to $P_i$.
106106

107-
> ✅ We showed in the [Math article](https://defi.sucks/insights/oracle-manipulation-101-math-edition) that this attack could be profitable only if the attack length is close to the length of the $TWAP$. This can be easily taken into account by setting the correct parameters.
107+
> ✅ We showed in the [Math article](https://wonderland.xyz/insights/oracle-manipulation-101-math-edition) that this attack could be profitable only if the attack length is close to the length of the $TWAP$. This can be easily taken into account by setting the correct parameters.
108108
>
109109
> Attacking a pool with healthy liquidity was extremely hard to do pre-PoS.
110110
@@ -152,7 +152,7 @@ How would an optimal attack scheme look post-PoS for a validator with $n$ consec
152152

153153
An attacker could also manipulate the TWAP without getting arbitraged if they propose several non-consecutive batches of blocks where they must sacrifice the final block of each batch to close the manipulation.
154154

155-
> ⚠️ The [Math article](https://defi.sucks/insights/oracle-manipulation-101-math-edition) shows that this attack can easily reach profitability, even after considering the $TWAP$. Increasing the $TWAP$ parameters will require the attacker to have a more significant up-front capital (redeemable after the attack). The absence of arbitrage in this scenario makes everything smoother from the attacker's perspective.
155+
> ⚠️ The [Math article](https://wonderland.xyz/insights/oracle-manipulation-101-math-edition) shows that this attack can easily reach profitability, even after considering the $TWAP$. Increasing the $TWAP$ parameters will require the attacker to have a more significant up-front capital (redeemable after the attack). The absence of arbitrage in this scenario makes everything smoother from the attacker's perspective.
156156
157157
![img/blog-posts/oracle-manipulation-101/graph-2.jpg](/img/blog-posts-img/oracle-manipulation-101/graph-2.jpg)
158158

sites/wonderland/blog/2023-04-05-a-mev-racing-story.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -81,7 +81,7 @@ Although the recent patches have reduced the risk of attacks, it has not entirel
8181

8282
![](/img/blog-posts-img/a-mev-racing-story/meme.jpg)
8383

84-
The chances of a malicious validator winning a race in the same block are “““low”””. However, multiblock attacks are a **very real and serious concern**. Validators from large validator pools, such as Coinbase, Binance, Lido, and Rocketpool, hold a significant portion of the validator power. There is a [high probability](https://alrevuelta.github.io/posts/ethereum-mev-multiblock) that stakers will propose multiple blocks in a row, and coordination among validators is also possible if the potential reward is significant. This was also one of the main reasons we built [PRICE](https://oracles.rip), an oracle that is able to detect and correct [TWAP multiblock manipulations](https://defi.sucks/insights/oracle-manipulation-101).
84+
The chances of a malicious validator winning a race in the same block are “““low”””. However, multiblock attacks are a **very real and serious concern**. Validators from large validator pools, such as Coinbase, Binance, Lido, and Rocketpool, hold a significant portion of the validator power. There is a [high probability](https://alrevuelta.github.io/posts/ethereum-mev-multiblock) that stakers will propose multiple blocks in a row, and coordination among validators is also possible if the potential reward is significant. This was also one of the main reasons we built [PRICE](https://oracles.rip), an oracle that is able to detect and correct [TWAP multiblock manipulations](https://wonderland.xyz/insights/oracle-manipulation-101).
8585

8686
## Attack breakdown
8787

sites/wonderland/blog/2024-06-03-lc-bridges.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,7 @@ So, what can we do? What is the trust-minimized solution to cross-chain?
3434

3535
### State proofs: an incomplete path
3636

37-
In a [previous post](https://defi.sucks/insights/current-state-of-storage-proofs), we went deep on state proofs; they allow anyone to verify a claim about a VM’s state from a single cryptographic commitment—the state root. This allows for arbitrary claims about another chain’s state or transactions. Moreover, the same state root is sufficient for every cross-chain application, making it a more scalable solution than passing individual messages around.
37+
In a [previous post](https://wonderland.xyz/insights/current-state-of-storage-proofs), we went deep on state proofs; they allow anyone to verify a claim about a VM’s state from a single cryptographic commitment—the state root. This allows for arbitrary claims about another chain’s state or transactions. Moreover, the same state root is sufficient for every cross-chain application, making it a more scalable solution than passing individual messages around.
3838

3939
As long as we trust the cryptographic primitives, falsifying a state proof is impossible. But this is only partially true: what if the root is not the right one? Who or how is the root uploaded? This has historically been the most painful point for cross-chain communication.
4040

@@ -154,7 +154,7 @@ The problem is that there isn’t a pre-compile nor efficient implementation in
154154

155155
Here is where ZK comes into play: we can create succinct arguments of knowledge (SNARKs) proving the correct execution of complex offchain computation.
156156

157-
> Quoting from a previous post: https://defi.sucks/insights/current-state-of-storage-proofs
157+
> Quoting from a previous post: https://wonderland.xyz/insights/current-state-of-storage-proofs
158158
>
159159
> [Succinct](https://www.succinct.xyz/) developed a [contract](https://etherscan.io/address/0xaa1383ee33c81ef2274419dd5e0ea5cce4baf6cc#code) that verifies a zk-proof of consensus, where anyone can post a zkSNARK attesting that the sync committee has signed a block header. Their design also requires keeping track of the current sync committee, which is done via a zkSNARK. The protocol is deployed on Ethereum and other chains, but the light client updates are operating [frequently only on Goerli](https://explorer.telepathy.xyz/). Each update in Ethereum costs [300k in gas](https://etherscan.io/tx/0x6d608c89eb97b249f40fc1db4306fe0b5af4d0dec3e1db1b8872b3ddf8c5af75). They enable light client proofs of Ethereum and Gnosis to Ethereum, Gnosis, Arbitrum, Avalanche, Binance, Optimism and Polygon (find the address [here](https://docs.telepathy.xyz/resources/contract-addresses)).
160160
>

sites/wonderland/docs/development/research/research-overview.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ sidebar_position: 1
66

77
# Research Overview
88

9-
Welcome. This section explains how Research fits across the project lifecycle and how we create value (from background work to design reviews and post‑launch notes). If you’re new, skim the [Project Lifecycle](https://handbook.defi.sucks/docs/processes/project-lifecycle) first.
9+
Welcome. This section explains how Research fits across the project lifecycle and how we create value (from background work to design reviews and post‑launch notes). If you’re new, skim the [Project Lifecycle](https://handbook.wonderland.xyz/docs/processes/project-lifecycle) first.
1010

1111
## What's Inside
1212
- **Manifesto**: The core values we expect from the research team.

sites/wonderland/docs/processes/github/repo-readiness.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -30,11 +30,11 @@
3030
- Contributors footer
3131

3232
```markdown
33-
PROJECT NAME was built with ❤️ by [Wonderland](https://defi.sucks).
33+
PROJECT NAME was built with ❤️ by [Wonderland](https://wonderland.xyz).
3434
3535
Wonderland is the largest core development group in Web3. Our commitment is to a financial future that's open, decentralized, and accessible to all.
3636
37-
[DeFi sucks](https://defi.sucks), but Wonderland is here to make it better.
37+
DeFi sucks, but [Wonderland](https://wonderland.xyz) is here to make it better.
3838
```
3939
4040
- Add a SECURITY file.

0 commit comments

Comments
 (0)