AI Agent + Web3 Research

AI Agent + Web3 Research DeFAI & AgentFi: Autonomous AI Trading and Yield Optimization Agents collect market information, predict future trends, and autonomously execute trades to generate returns. Agents are likely to remain more rational than humans, potentially delivering higher long-term returns. Agents can manage funds on behalf of users, monitor markets, spot high-yield opportunities early, and enter positions ahead of the crowd to capture early-bird returns. They can also detect negative signals, predict losses, and exit positions preemptively to hedge risk. Or they can automatically rebalance based on price to ensure users’ provided liquidity keeps earning yield. ...

January 16, 2026 · 4 min · 🦉

MCP OAuth

Updated 0115 Lol, turns out there was already a ready-made solution and I was here drawing diagrams from scratch 😅 https://mcp-auth.dev/docs/tutorials/todo-manager I’ve been experimenting with building some MCP servers lately. When dealing with multiple users, authorization becomes a concern. MCP clients (Agents) currently need to complete authorization when connecting to an MCP server, i.e., at initialization time. I mapped out two MCP OAuth flows for reference in future development. Case 1: The third-party app natively supports OAuth. This is the simpler case — just authorize directly with the third-party app, and the Agent can call tools normally. ...

January 8, 2026 · 1 min · 🦉

Ethernaut Notes

Introduction I’ve learned a lot from Ethernaut recently. Setting aside the more basic stuff, I want to document some ECDSA-related notes. In the formulas below, lowercase letters represent scalar values, uppercase letters represent points, except N which is the curve order. ECDSA relies on the discrete logarithm problem on elliptic curves. For a private key privkey, the public key PubKey is a point on the elliptic curve satisfying $\text{PubKey} = \text{privkey} \cdot G$, where G is the generator of the elliptic curve. Because the discrete logarithm problem on elliptic curves makes it computationally infeasible to derive privkey from PubKey and G, digital signatures become possible. ...

December 1, 2025 · 8 min · 🦉

proxychains4 Not Working Properly on macOS

I installed proxychains-ng to force certain programs to go through a proxy, but found it works inconsistently on macOS. After some research, the culprit is macOS SIP (System Integrity Protection). proxychains4 works by replacing the dynamic libraries of child processes to force them through a proxy. However, macOS SIP prevents all built-in executables from having their dynamic libraries replaced for security reasons — so proxychains4 simply doesn’t work with anything under /usr/bin/. ...

July 4, 2025 · 1 min · 🦉

Adapting Blog PWA Mode for Mobile

The following has only been tested on iOS Opening the blog on a desktop is great, of course. But opening it on mobile and saving it as a bookmark to the home screen gives a rather peculiar experience. Other bookmarks like Grafana and UptimeKuma open in full-screen mode and feel super smooth. But my own blog bookmark, when tapped, redirects to open in Safari — which is confusing. A quick search turned up both the cause and the fix. ...

June 23, 2025 · 1 min · 🦉

Crypto Scam

Introduction Every year, countless people suffer heavy losses from various scams. This post focuses on some of the most common scams seen recently. Categories Crypto Drainers (the most common) link How They Appear Usually they mimic the layout and style of official websites, with content about claiming airdrops and such. One variant: clicking a button connects your wallet and immediately pops up a signature request. link Another variant: when connecting your wallet, it shows an error or “busy” message, then asks you to type in your seed phrase or private key directly. Very straightforward… ...

February 28, 2025 · 24 min · 🦉