
Security News
AGENTS.md Gains Traction as an Open Format for AI Coding Agents
AGENTS.md is a fast-growing open format giving AI coding agents a shared, predictable way to understand project setup, style, and workflows.
@symbioticfi/burners
Advanced tools
Symbiotic Burners repository contains an implementation of Burner Router allowing the construction of flexible on-slash burning mechanics and several pure Burners for different assets.
Symbiotic Protocol is an extremely flexible and permissionless shared security system.
This repository contains Symbiotic Default Burners contracts.
Technical documentation can be found here.
Security audits can be found here.
Not included files:
Create .env
file using a template:
ETH_RPC_URL=
ETH_RPC_URL_HOLESKY=
ETHERSCAN_API_KEY=
* ETH_RPC_URL is optional.
* ETH_RPC_URL_HOLESKY is optional.
* ETHERSCAN_API_KEY is optional.
forge build
forge test
forge fmt
forge snapshot
FAQs
Symbiotic Burners repository contains an implementation of Burner Router allowing the construction of flexible on-slash burning mechanics and several pure Burners for different assets.
The npm package @symbioticfi/burners receives a total of 8 weekly downloads. As such, @symbioticfi/burners popularity was classified as not popular.
We found that @symbioticfi/burners demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 2 open source maintainers collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
AGENTS.md is a fast-growing open format giving AI coding agents a shared, predictable way to understand project setup, style, and workflows.
Security News
/Research
Malicious npm package impersonates Nodemailer and drains wallets by hijacking crypto transactions across multiple blockchains.
Security News
This episode explores the hard problem of reachability analysis, from static analysis limits to handling dynamic languages and massive dependency trees.