<?xml version="1.0" encoding="UTF-8"?><urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:news="http://www.google.com/schemas/sitemap-news/0.9" xmlns:xhtml="http://www.w3.org/1999/xhtml" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:video="http://www.google.com/schemas/sitemap-video/1.1"><url><loc>https://www.zellic.io/blog/algebraic-attacks-on-zk-hash-functions</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/all-ethereum-contracts</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/announcing-smart-contract-fiesta</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/ante-x-zellic</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/archive</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/audit-competition-faq</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/audit-drift</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/binance-bridge-hack-in-laymans-terms</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/bls-signature-versatility</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/breaking-down-the-economics-of-defi-hacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/browsing-for-bugs-3m-bug-in-premia-finance</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/building-with-bitcoin</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/cairo-security-primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/can-gpt-audit-smart-contracts</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/choosing-a-defi-protocol</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/code4rena-free-contests</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/csprngs-how-to-properly-generate-random-numbers</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/erc-4337-primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/eth2-proof-of-stake-developer-guide</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/euler-finance-exploit-analysis</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/evm-trackooor</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/exploring-cosmos-a-security-primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/exploring-erc-4626</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/featured-posts/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/fhe-security-attacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/finding-a-critical-vulnerability-in-astar</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/formal-verification-weth</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/gnark-bug-groth16-commitments</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/groq-tsp-whitepapers</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/how-does-tornado-cash-work</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/how-does-zcash-work</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/how-not-to-create-a-cdp-or-lending-protocol</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/how-to-create-an-ethereum-ctf-challenge</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/intro-to-zk-part-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/intro-to-zk-part-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/introducing-movetool</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/introducing-polocolo</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/introducing-v12</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/issues-in-forks-of-gains</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/markdown-page</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/masamune-tool</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/move-fast-and-break-things-pt-1</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/move-fast-break-things-move-security-part-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/mpc-from-scratch</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/mpc-wallet-primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/near-protocol-bug</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/paradigmctf-challenges-writeup</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/proton-dart-flutter-csprng-prng</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/pwning-v8ctf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/safemoon-exploit-explained</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/signal-username-ristretto-hashes</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/solana-sbpf</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/auditing</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/bitcoin</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/cosmos</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/cryptography</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/de-fi</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/ethereum</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/featured</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/hacks</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/move</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/news</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/solana</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/ton</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/validators</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/vulnerabilities</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/web-2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/tags/zk</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/the-auditooor-grindset</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/the-billion-dollar-move-bug</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/the-vulnerabilities-youll-write-with-anchor</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/ton-security-primer</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/top-10-aptos-move-bugs</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/webview-security</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/what-are-elliptic-curve-pairings</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/what-is-a-zk-audit</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/why-code4rena</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/your-sandwich-is-my-lunch-how-to-drain-mev-contracts-v2</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zellic-darpa-aixcc</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zellic-solp</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zellic-validators</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zellic-wins-second-place-in-zkhack-iv</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zellic-wins-two-puzzles-in-zkhack-v</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/zk-friendly-hash-functions</loc><changefreq>weekly</changefreq><priority>0.5</priority></url><url><loc>https://www.zellic.io/blog/</loc><changefreq>weekly</changefreq><priority>0.5</priority></url></urlset>