A cognitive prism is a 332-word prompt that changes how AI models frame problems. Instead of code review, the model produces conservation laws — structural trade-offs that predict where future vulnerabilities will appear. We analyzed 9 infrastructure targets the Ethereum ecosystem depends on.
permit() bypasses standard allowance checks. Transitive permission escalation via grantRole(). Admin hierarchy bypass through contract-to-contract role grants.
Lido stETH — Liquid Staking Infrastructure
StETH + Lido core. 1,905 lines source.
Conservation Law
Observer-Dependent Value × Denomination = Constant
3
Exploit Vectors
3,508
Lines of Analysis
10
Pipeline Passes
Observer-Dependent Value Creation
The share rate isn't hiding a true value — it creates value by being different for each observer.
Exploit Surface
Dilution attacks via adapters minting unbacked shares. Front-running via oracle information asymmetry. Staking router loads withdrawal queues without allowlist.
Information Access × Execution Efficiency = Constant
7
Findings
2,665
Lines of Analysis
10
Pipeline Passes
Identity Fragmentation
Phantom identities through normalization inconsistency. ENS domain seizure permanently breaks agent identity. Circular delegation creates infinite loops (DoS via gas exhaustion).
x402 Protocol — Coinbase Payment Infrastructure
Client + server + facilitator core. 2,026 lines source.
Conservation Law
Deployment Decoupling ↔ Operational Coherence
5
Findings
2,908
Lines of Analysis
10
Pipeline Passes
Centralized Assumptions in Distributed Protocol
Facilitator is single point of trust in a protocol designed to minimize trust. Race conditions in async hook state. Silent failures when networks overlap.