# Encyclopedia of Security Research

## Common Patterns & Integrations

{% content-ref url="encyclopedia-of-security-research/uniswap" %}
[uniswap](https://lab.guardianaudits.com/encyclopedia-of-security-research/uniswap)
{% endcontent-ref %}

{% content-ref url="encyclopedia-of-security-research/layerzero" %}
[layerzero](https://lab.guardianaudits.com/encyclopedia-of-security-research/layerzero)
{% endcontent-ref %}

{% content-ref url="encyclopedia-of-security-research/whitelists" %}
[whitelists](https://lab.guardianaudits.com/encyclopedia-of-security-research/whitelists)
{% endcontent-ref %}

{% content-ref url="encyclopedia-of-security-research/interfaces" %}
[interfaces](https://lab.guardianaudits.com/encyclopedia-of-security-research/interfaces)
{% endcontent-ref %}
