Protect Your Project Today
Strengthen your project with the largest web3 security provider.
A CertiK security expert will review your request and follow up shortly.

Technical Blogs

The Enterprise DLT Oracle Challenge

The Enterprise DLT Oracle Challenge

In DeFi, oracle failures can cause financial losses within a system that broadly accepts risk. Enterprise DLT operates in a different world. The assets are physical. The counterparties are regulated. The consequences are legal.

React/Next.js CVE-2025-55182 Vulnerability Analysis

React/Next.js CVE-2025-55182 Vulnerability Analysis

A critical vulnerability, CVE-2025-55182, was recently disclosed and carries a CVSS 10.0 (the most critical) severity rating. The issue affects React/Next.js environments. Our security research team has analyzed the vulnerability and detected many applications in the Web3 ecosystem running the affected versions, including several that are actively exploitable.

PancakeSwap Infinity: Hooks Security Considerations

PancakeSwap Infinity: Hooks Security Considerations

This article discusses some of the new features of PancakeSwap Infinity, and explores the security considerations related to PancakeSwap Infinity hooks.

Pectra’s EIP-7702: Redefining Trust Assumptions of Externally Owned Accounts (EOAs) in EVM

Pectra’s EIP-7702: Redefining Trust Assumptions of Externally Owned Accounts (EOAs) in EVM

In this post, we examine how EIP-7702 reshapes core EVM assumptions, spotlight mocked examples, and provide actionable guidance for developers to assess whether their existing contracts may be vulnerable.

Oracle Wars: The Rise of Price Manipulation Attacks

Oracle Wars: The Rise of Price Manipulation Attacks

In this article, we look at how oracles work, why they matter, how they can be exploited, and more, with the goal of educating DeFi participants on how to better protect themselves from these types of threats.

Uniswap V4: Hooks Security Considerations

Uniswap V4: Hooks Security Considerations

This article discusses some of the new features of Uniswap V4, and explores the security considerations related to Uniswap V4 hooks.

Web2 Meets Web3: Hacking Decentralized Applications

Web2 Meets Web3: Hacking Decentralized Applications

This blog offers insights into the differences between traditional Web2 applications and Web3 Dapps, Dapp threat modeling, and unique attack vectors enabled by the integration of blockchain components.

Risk & Security Enhancement for App Chains: An In-depth Writeup of CWA-2023-004

Risk & Security Enhancement for App Chains: An In-depth Writeup of CWA-2023-004

In January 2024, CertiK research team, in collaboration with Confio's security contributors, identified and addressed a high-impact vulnerability affecting App Chains that allow permissionless uploads in the CosmosWasm ecosystem. This vulnerability, designated as CWA-2023-004, enables a remote attacker to submit a malformed contract payload, causing a deterministic failure in every transaction processed by the WasmVM. This ultimately leads to a widespread outage across the validator network.

Advanced Formal Verification of ZKP: A Tale of Two Bugs

Advanced Formal Verification of ZKP: A Tale of Two Bugs

In this post, we focus on the bug discovery process of our formal verification of zkWasm instructions, examining specific bugs encountered during the process and the lessons learned.

Uncovering and Resolving a Cross-Site Scripting Attack in a Popular Wallet Protocol

Uncovering and Resolving a Cross-Site Scripting Attack in a Popular Wallet Protocol

We discovered an XSS vulnerability in WalletConnect's Verify API, which could have been manipulated to create a convincing phishing site.

BGP Hijacking: How Hackers Circumvent Internet Routing Security to Tear the Digital Fabric of Trust

BGP Hijacking: How Hackers Circumvent Internet Routing Security to Tear the Digital Fabric of Trust

The Border Gateway Protocol acts as the Internet's postal service, directing how information should traverse between different networks. It has been exploited by hackers to attack multiple Web3 platforms.

How Hackers Use DNS Hijacking Attacks to Steal Funds and Clone Websites

How Hackers Use DNS Hijacking Attacks to Steal Funds and Clone Websites

Hackers are using a technique known as DNS hijacking to steal Web3 users' seed phrases with sophisticated phishing attacks.

Showing 1-12 of 22 items