{"version":1,"pages":[{"id":"owCXZOijPDOPZskRhSyC","title":"VERITAS PROTOCOL","pathname":"/","siteSpaceId":"sitesp_lF0kR","emoji":"1f441-1f5e8"},{"id":"4Iw7JaQxgwlB95eNjCOZ","title":"WHITE PAPER","pathname":"/veritas-protocol/white-paper","siteSpaceId":"sitesp_lF0kR","emoji":"1f4d6","description":"10X Faster, 90% More Affordable Blockchain Security for Users, Investors and Projects","breadcrumbs":[{"label":"VERITAS PROTOCOL","emoji":"1f441-1f5e8"}]},{"id":"eQUMC8mAAmewJcd81ztl","title":"Legal and Regulatory Considerations","pathname":"/veritas-protocol/white-paper/legal-and-regulatory-considerations","siteSpaceId":"sitesp_lF0kR","breadcrumbs":[{"label":"VERITAS PROTOCOL","emoji":"1f441-1f5e8"},{"label":"WHITE PAPER","emoji":"1f4d6"}]},{"id":"kPP2xLUsQlpm7yPULJGB","title":"TECH PAPER","pathname":"/veritas-protocol/tech-paper","siteSpaceId":"sitesp_lF0kR","emoji":"1f4ca","breadcrumbs":[{"label":"VERITAS PROTOCOL","emoji":"1f441-1f5e8"}]},{"id":"D27Xkkzn01ejSZa8fPJO","title":"Insurance Pool","pathname":"/veritas-protocol/insurance-pool","siteSpaceId":"sitesp_lF0kR","emoji":"1f499","description":"Securing the Future: Blockchain-based Digital Insurance for Smart Contract Failures","breadcrumbs":[{"label":"VERITAS PROTOCOL","emoji":"1f441-1f5e8"}]},{"id":"nPgwcU7BPQEfJU2sIVie","title":"TOKENOMICS","pathname":"/veritas-protocol/tokenomics","siteSpaceId":"sitesp_lF0kR","emoji":"1f4ca","description":"0x00096697dc24bd10423690126d91546a20ccb3f0","breadcrumbs":[{"label":"VERITAS PROTOCOL","emoji":"1f441-1f5e8"}]},{"id":"K1QuDIfnTAFCMGujQkGo","title":"RESEARCH","pathname":"/research","siteSpaceId":"sitesp_lF0kR","emoji":"1f9d1-1f4bb"},{"id":"uWaj5x1b8TKGn3PIaJIg","title":"THESIS","pathname":"/thesis","siteSpaceId":"sitesp_lF0kR","emoji":"1f4c3"},{"id":"CH6RLidyoc9TaPo66oUQ","title":"Automated Audits","pathname":"/thesis/automated-audits","siteSpaceId":"sitesp_lF0kR","icon":"bolt-auto","description":"","breadcrumbs":[{"label":"THESIS","emoji":"1f4c3"}]},{"id":"1rggNJ8PMECPV4vwDDjI","title":"Smart Contract “Kill Switch”","pathname":"/thesis/smart-contract-kill-switch","siteSpaceId":"sitesp_lF0kR","icon":"skull-crossbones","description":"Examining the Feasibility and Implications of Implementing Smart Contract Termination Mechanisms in Blockchain Systems","breadcrumbs":[{"label":"THESIS","emoji":"1f4c3"}]},{"id":"70NXrl5OftRxDsWOc2RH","title":"WHY AI?","pathname":"/why-ai","siteSpaceId":"sitesp_lF0kR","emoji":"2049","description":"From Training to Hacking - A Powerful Shift, Responsibly Managed"},{"id":"wTi1ts4hr1aRbPpJSZs2","title":"MANUAL AUDITS","pathname":"/manual-audits","siteSpaceId":"sitesp_lF0kR","emoji":"1f6e1","description":"Some of the recent manual audits"},{"id":"oPKOKaWW21w8ZF7bzzr2","title":"GUIDES","pathname":"/guides","siteSpaceId":"sitesp_lF0kR","emoji":"2139"},{"id":"Z5OP8wimFcpBFI40zOlQ","title":"A Guide on What to do After Your Funds Have Been Stolen","pathname":"/guides/a-guide-on-what-to-do-after-your-funds-have-been-stolen","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"totrFPGFtPjIM1ZkCd6q","title":"Security Audit Checklist for Account Abstraction Wallets","pathname":"/guides/security-audit-checklist-for-account-abstraction-wallets","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","description":"A baseline checklist for auditing account abstraction wallets implemented based on the EIP4337 standard","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"5v0Owp2uAAKP8knOsNlS","title":"Upgrade to Public Blockchain Security Audit Guide","pathname":"/guides/upgrade-to-public-blockchain-security-audit-guide","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"VqGiHGAwKgMPYsnPlNd6","title":"Security Guide for Securing X (Twitter) Account","pathname":"/guides/security-guide-for-securing-x-twitter-account","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"4ruf24PxtahdMXpQTgJn","title":"Navigating Wallet Types and Risks","pathname":"/guides/navigating-wallet-types-and-risks","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"X5p5204ypssSMN0ZFewa","title":"The Dark Forest Manual Guide","pathname":"/guides/the-dark-forest-manual-guide","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","description":"Master the security of your cryptocurrency","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"L6zxvEzLV8rRaO4yww2u","title":"Understanding Known-Plaintext Attacks and How to Prevent Them","pathname":"/guides/understanding-known-plaintext-attacks-and-how-to-prevent-them","siteSpaceId":"sitesp_lF0kR","icon":"shield-check","breadcrumbs":[{"label":"GUIDES","emoji":"2139"}]},{"id":"3HWxQWJ10DcDXWoUPnKH","title":"Veritas Explorer (B2C)","pathname":"/ecosystem/veritas-explorer-b2c","siteSpaceId":"sitesp_lF0kR","emoji":"1f50d","breadcrumbs":[{"label":"ECOSYSTEM"}]},{"id":"TbCYXug9yDJYWrlTtd0K","title":"Veritas Audit (B2B)","pathname":"/ecosystem/veritas-audit-b2b","siteSpaceId":"sitesp_lF0kR","emoji":"1f6e1","breadcrumbs":[{"label":"ECOSYSTEM"}]},{"id":"hlNOGmH2ymLn9H28TKno","title":"Private Security Audit","pathname":"/ecosystem/private-security-audit","siteSpaceId":"sitesp_lF0kR","emoji":"1f575-2642","description":"AI Checks, Human Audits","breadcrumbs":[{"label":"ECOSYSTEM"}]},{"id":"YwzQsSPbtGwKLEvZTrmq","title":"Security Audit Methodology","pathname":"/ecosystem/private-security-audit/security-audit-methodology","siteSpaceId":"sitesp_lF0kR","breadcrumbs":[{"label":"ECOSYSTEM"},{"label":"Private Security Audit","emoji":"1f575-2642"}]},{"id":"7JcyPEybSGs31Pehh9Mc","title":"SoulBound Audit Token","pathname":"/ecosystem/soulbound-audit-token","siteSpaceId":"sitesp_lF0kR","emoji":"2611","description":"Soulbound NFT Certificates as Proof-of-Audit","breadcrumbs":[{"label":"ECOSYSTEM"}]},{"id":"Dt864xQeqOMpBfr7aYhI","title":"Add-Ons","pathname":"/ecosystem/add-ons","siteSpaceId":"sitesp_lF0kR","emoji":"26d1","description":"Additional Services","breadcrumbs":[{"label":"ECOSYSTEM"}]}]}