{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2026:KKUV7UYYVPOQEDAI4UYPHQP67Z","short_pith_number":"pith:KKUV7UYY","canonical_record":{"source":{"id":"2605.09124","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-09T19:15:49Z","cross_cats_sorted":[],"title_canon_sha256":"39e63d91dc2d8eb9289b07187516f88e296c22af9b55f333b6491a0cd074743c","abstract_canon_sha256":"7aa7db0fa8c6058dccf66125890c902f27e226adb1f7aaf32a0a34129d947deb"},"schema_version":"1.0"},"canonical_sha256":"52a95fd318abdd020c08e530f3c1fefe4db1b5e2947c3704ee7bfcc8f560d139","source":{"kind":"arxiv","id":"2605.09124","version":2},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.09124","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"arxiv_version","alias_value":"2605.09124v2","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.09124","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_12","alias_value":"KKUV7UYYVPOQ","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_16","alias_value":"KKUV7UYYVPOQEDAI","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_8","alias_value":"KKUV7UYY","created_at":"2026-05-20T00:03:16Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2026:KKUV7UYYVPOQEDAI4UYPHQP67Z","target":"record","payload":{"canonical_record":{"source":{"id":"2605.09124","kind":"arxiv","version":2},"metadata":{"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-09T19:15:49Z","cross_cats_sorted":[],"title_canon_sha256":"39e63d91dc2d8eb9289b07187516f88e296c22af9b55f333b6491a0cd074743c","abstract_canon_sha256":"7aa7db0fa8c6058dccf66125890c902f27e226adb1f7aaf32a0a34129d947deb"},"schema_version":"1.0"},"canonical_sha256":"52a95fd318abdd020c08e530f3c1fefe4db1b5e2947c3704ee7bfcc8f560d139","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-20T00:03:16.184152Z","signature_b64":"MwYcyXAzS+Y3ZKILn2B8HLm38JEAgyUPbqeq+pSwvw5xS6T1Iq46THo44Rudo5tjg51Li85Rv2+EyjOhb4khBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"52a95fd318abdd020c08e530f3c1fefe4db1b5e2947c3704ee7bfcc8f560d139","last_reissued_at":"2026-05-20T00:03:16.183280Z","signature_status":"signed_v1","first_computed_at":"2026-05-20T00:03:16.183280Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"2605.09124","source_version":2,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:03:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"eJXNf2UBUsqk2aA/ZXPu8BF39Xi+OBB64synRgJuAt8bMy9AIGorP3tt/zoDQ7CkOfYZsUJAU0DBSfBmpLbeBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:40:31.140925Z"},"content_sha256":"fdd4d0941bf54703b845befce13b08f5b85b6f4cf766813cf2dcf8961ac202f1","schema_version":"1.0","event_id":"sha256:fdd4d0941bf54703b845befce13b08f5b85b6f4cf766813cf2dcf8961ac202f1"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2026:KKUV7UYYVPOQEDAI4UYPHQP67Z","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"Smart Contract Security Beyond Detection","license":"http://creativecommons.org/licenses/by/4.0/","headline":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring.","cross_cats":[],"primary_cat":"cs.CR","authors_text":"Tamer Abdelaziz","submitted_at":"2026-05-09T19:15:49Z","abstract_excerpt":"Smart contract security has progressed from vulnerability detection toward a broader research agenda that includes semantic reasoning, automated repair, adversarial robustness, and real-time exploit detection. This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning [1], automated smart contract repair with formal guarantees [2], adversarial learning for robust malicious contract and transaction detection [3], and real-time transaction-level exploit detection at blockchain scale [4]. We connec"},"claims":{"count":4,"items":[{"kind":"strongest_claim","text":"This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning, automated smart contract repair with formal guarantees, adversarial learning for robust malicious contract and transaction detection, and real-time transaction-level exploit detection at blockchain scale.","source":"verdict.strongest_claim","status":"machine_extracted","claim_id":"C1","attestation":"unclaimed"},{"kind":"weakest_assumption","text":"That synthesizing these four directions with the two cited studies will produce technically grounded, empirically measurable capstone projects that advance the field.","source":"verdict.weakest_assumption","status":"machine_extracted","claim_id":"C2","attestation":"unclaimed"},{"kind":"one_line_summary","text":"The paper presents a capstone-oriented framework connecting four research directions in smart contract security to two recent frontier studies.","source":"verdict.one_line_summary","status":"machine_extracted","claim_id":"C3","attestation":"unclaimed"},{"kind":"headline","text":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring.","source":"verdict.pith_extraction.headline","status":"machine_extracted","claim_id":"C4","attestation":"unclaimed"}],"snapshot_sha256":"7e24ce0cff86f4b8e920226338009dffaf9e1210d4fb9b59c33d359b6d0b6475"},"source":{"id":"2605.09124","kind":"arxiv","version":2},"verdict":{"id":"a510d075-0d50-4af4-ba61-21424ac07d4e","model_set":{"reader":"grok-4.3"},"created_at":"2026-05-12T02:28:03.097475Z","strongest_claim":"This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning, automated smart contract repair with formal guarantees, adversarial learning for robust malicious contract and transaction detection, and real-time transaction-level exploit detection at blockchain scale.","one_line_summary":"The paper presents a capstone-oriented framework connecting four research directions in smart contract security to two recent frontier studies.","pipeline_version":"pith-pipeline@v0.9.0","weakest_assumption":"That synthesizing these four directions with the two cited studies will produce technically grounded, empirically measurable capstone projects that advance the field.","pith_extraction_headline":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring."},"integrity":{"clean":true,"summary":{"advisory":0,"critical":0,"by_detector":{},"informational":0},"endpoint":"/pith/2605.09124/integrity.json","findings":[],"available":true,"detectors_run":[{"name":"ai_meta_artifact","ran_at":"2026-05-19T20:37:36.585377Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_title_agreement","ran_at":"2026-05-19T13:31:18.775572Z","status":"completed","version":"1.0.0","findings_count":0},{"name":"doi_compliance","ran_at":"2026-05-19T10:30:25.211190Z","status":"completed","version":"1.0.0","findings_count":0}],"snapshot_sha256":"a84139ce1870bee9d880264ff7bae607a72f00dcd5e8792cb100e1c0167ba149"},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":"a510d075-0d50-4af4-ba61-21424ac07d4e"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-20T00:03:16Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"1MhXq1GzfnQsQKq9XpCy3yu6p5MjZ6qSvKBfcG5GihEOTYwMHN54JfzsoxNOopRqyAlEf7YQZmMT0XXtl4k5AQ==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T21:40:31.141461Z"},"content_sha256":"743bf152bd92a39f53afb3f15bc3b7f7b02971a8b7434af93916490386234342","schema_version":"1.0","event_id":"sha256:743bf152bd92a39f53afb3f15bc3b7f7b02971a8b7434af93916490386234342"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/bundle.json","state_url":"https://pith.science/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T21:40:31Z","links":{"resolver":"https://pith.science/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z","bundle":"https://pith.science/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/bundle.json","state":"https://pith.science/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/state.json","well_known_bundle":"https://pith.science/.well-known/pith/KKUV7UYYVPOQEDAI4UYPHQP67Z/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2026:KKUV7UYYVPOQEDAI4UYPHQP67Z","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"7aa7db0fa8c6058dccf66125890c902f27e226adb1f7aaf32a0a34129d947deb","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-09T19:15:49Z","title_canon_sha256":"39e63d91dc2d8eb9289b07187516f88e296c22af9b55f333b6491a0cd074743c"},"schema_version":"1.0","source":{"id":"2605.09124","kind":"arxiv","version":2}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"2605.09124","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"arxiv_version","alias_value":"2605.09124v2","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.2605.09124","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_12","alias_value":"KKUV7UYYVPOQ","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_16","alias_value":"KKUV7UYYVPOQEDAI","created_at":"2026-05-20T00:03:16Z"},{"alias_kind":"pith_short_8","alias_value":"KKUV7UYY","created_at":"2026-05-20T00:03:16Z"}],"graph_snapshots":[{"event_id":"sha256:743bf152bd92a39f53afb3f15bc3b7f7b02971a8b7434af93916490386234342","target":"graph","created_at":"2026-05-20T00:03:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":4,"items":[{"attestation":"unclaimed","claim_id":"C1","kind":"strongest_claim","source":"verdict.strongest_claim","status":"machine_extracted","text":"This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning, automated smart contract repair with formal guarantees, adversarial learning for robust malicious contract and transaction detection, and real-time transaction-level exploit detection at blockchain scale."},{"attestation":"unclaimed","claim_id":"C2","kind":"weakest_assumption","source":"verdict.weakest_assumption","status":"machine_extracted","text":"That synthesizing these four directions with the two cited studies will produce technically grounded, empirically measurable capstone projects that advance the field."},{"attestation":"unclaimed","claim_id":"C3","kind":"one_line_summary","source":"verdict.one_line_summary","status":"machine_extracted","text":"The paper presents a capstone-oriented framework connecting four research directions in smart contract security to two recent frontier studies."},{"attestation":"unclaimed","claim_id":"C4","kind":"headline","source":"verdict.pith_extraction.headline","status":"machine_extracted","text":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring."}],"snapshot_sha256":"7e24ce0cff86f4b8e920226338009dffaf9e1210d4fb9b59c33d359b6d0b6475"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"integrity":{"available":true,"clean":true,"detectors_run":[{"findings_count":0,"name":"ai_meta_artifact","ran_at":"2026-05-19T20:37:36.585377Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"doi_title_agreement","ran_at":"2026-05-19T13:31:18.775572Z","status":"completed","version":"1.0.0"},{"findings_count":0,"name":"doi_compliance","ran_at":"2026-05-19T10:30:25.211190Z","status":"completed","version":"1.0.0"}],"endpoint":"/pith/2605.09124/integrity.json","findings":[],"snapshot_sha256":"a84139ce1870bee9d880264ff7bae607a72f00dcd5e8792cb100e1c0167ba149","summary":{"advisory":0,"by_detector":{},"critical":0,"informational":0}},"paper":{"abstract_excerpt":"Smart contract security has progressed from vulnerability detection toward a broader research agenda that includes semantic reasoning, automated repair, adversarial robustness, and real-time exploit detection. This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning [1], automated smart contract repair with formal guarantees [2], adversarial learning for robust malicious contract and transaction detection [3], and real-time transaction-level exploit detection at blockchain scale [4]. We connec","authors_text":"Tamer Abdelaziz","cross_cats":[],"headline":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring.","license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-09T19:15:49Z","title":"Smart Contract Security Beyond Detection"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"2605.09124","kind":"arxiv","version":2},"verdict":{"created_at":"2026-05-12T02:28:03.097475Z","id":"a510d075-0d50-4af4-ba61-21424ac07d4e","model_set":{"reader":"grok-4.3"},"one_line_summary":"The paper presents a capstone-oriented framework connecting four research directions in smart contract security to two recent frontier studies.","pipeline_version":"pith-pipeline@v0.9.0","pith_extraction_headline":"Smart contract security is expanding beyond vulnerability detection into semantics, repair, adversarial learning and real-time monitoring.","strongest_claim":"This paper develops a capstone-oriented research narrative around four directions: foundation-model-based smart contract semantics and vulnerability reasoning, automated smart contract repair with formal guarantees, adversarial learning for robust malicious contract and transaction detection, and real-time transaction-level exploit detection at blockchain scale.","weakest_assumption":"That synthesizing these four directions with the two cited studies will produce technically grounded, empirically measurable capstone projects that advance the field."}},"verdict_id":"a510d075-0d50-4af4-ba61-21424ac07d4e"}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:fdd4d0941bf54703b845befce13b08f5b85b6f4cf766813cf2dcf8961ac202f1","target":"record","created_at":"2026-05-20T00:03:16Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"7aa7db0fa8c6058dccf66125890c902f27e226adb1f7aaf32a0a34129d947deb","cross_cats_sorted":[],"license":"http://creativecommons.org/licenses/by/4.0/","primary_cat":"cs.CR","submitted_at":"2026-05-09T19:15:49Z","title_canon_sha256":"39e63d91dc2d8eb9289b07187516f88e296c22af9b55f333b6491a0cd074743c"},"schema_version":"1.0","source":{"id":"2605.09124","kind":"arxiv","version":2}},"canonical_sha256":"52a95fd318abdd020c08e530f3c1fefe4db1b5e2947c3704ee7bfcc8f560d139","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"52a95fd318abdd020c08e530f3c1fefe4db1b5e2947c3704ee7bfcc8f560d139","first_computed_at":"2026-05-20T00:03:16.183280Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-20T00:03:16.183280Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"MwYcyXAzS+Y3ZKILn2B8HLm38JEAgyUPbqeq+pSwvw5xS6T1Iq46THo44Rudo5tjg51Li85Rv2+EyjOhb4khBA==","signature_status":"signed_v1","signed_at":"2026-05-20T00:03:16.184152Z","signed_message":"canonical_sha256_bytes"},"source_id":"2605.09124","source_kind":"arxiv","source_version":2}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:fdd4d0941bf54703b845befce13b08f5b85b6f4cf766813cf2dcf8961ac202f1","sha256:743bf152bd92a39f53afb3f15bc3b7f7b02971a8b7434af93916490386234342"],"state_sha256":"27eb1a9d2e27d6cd141e32aaad3ea3c824e583e031b4d96060f7e82ce9f4d33a"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"MkEtff8jgJvAWSkvSL1gERedVf+Ct8Ieank/Nhj7h0Pu1M+FC9fdSxEzcbVKlkknwk87fLoBExOY+uyshWzPDw==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T21:40:31.143842Z","bundle_sha256":"095319bfb16d37e5fc0f6df4ecc75f3e57d614532611f567988f31f7e9f69406"}}