CertiK 블로그

Web3의 기관화가 본격화되는 흐름에 맞춰 보안 연구, 규제 동향 및 데이터 분석을 통해 업계 변화를 실행 가능한 의사결정 인사이트로 전환합니다.

가장 밝은 부분 · 보고서· 보안 보고서

2026년 5월 12일

Skynet DPRK Crypto Threats Report

Our Skynet DPRK Crypto Threats Report discusses key North Korean hacker trends, including amounts stolen, number of incidents, and the most substantial hacks over the past 10 years.

더 읽어보기
가장 밝은 부분 · 보고서· 산업 연구

2026년 4월 28일

Skynet State of Digital Asset Regulations Report

For companies operating or planning to scale globally, the implications are that multi-jurisdictional licensing is now a baseline requirement; AML compliance budgets must align with the scale of enforcement; and security audits are recurring, jurisdiction-specific costs, rather than one-time exercises.

더 읽어보기
가장 밝은 부분 · 보고서· 보안 보고서

2026년 2월 2일

Skynet Wrench Attacks Report

In 2025, wrench attacks unfortunately crossed a critical threshold. What was once treated as an edge-case risk has become a structural threat to digital asset ownership. Attackers are no longer acting opportunistically; they are operating as organized, transnational groups that combine OSINT-driven targeting, social engineering, and extreme physical violence to extract private keys.

더 읽어보기
가장 밝은 부분 · 보고서· 보안 보고서

2026년 3월 12일

Skynet 암호화폐 ATM 사기 보고서

암호화폐 ATM 사기는 미국에서 가장 빠르게 증가하고 있는 금융 범죄 유형 중 하나로 자리 잡았습니다. 범죄 조직들은 암호화폐 키오스크의 빠른 거래 속도와 가명성(pseudonymity)을 악용해 취약한 계층으로부터 자금을 갈취하는 활동을 점점 더 빠른 속도로 확대하고 있습니다. Skynet 암호화폐 ATM 사기 보고서에서는 암호화폐 ATM 공격의 유형, 글로벌 통계, 공격자 프로파일, 주요 법 집행 사례, 탐지 및 대응 전략, 그리고 이러한 사기로부터 보호하기 위한 권고 사항을 다룹니다.

더 읽어보기

최근 게시물

모두 보기
Skynet DPRK Crypto Threats Report
새로운 · 보고서 ·보안 보고서

Skynet DPRK Crypto Threats Report

Our Skynet DPRK Crypto Threats Report discusses key North Korean hacker trends, including amounts stolen, number of incidents, and the most substantial hacks over the past 10 years.

The Rise of the Agent Economy, Part 2:  Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

The Rise of the Agent Economy, Part 2: Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

Standards like EIP-8004 and EIP-8183 are strong foundations, but as we build more complex layers, such as scoring systems, hooks, and AI evaluators, new risks are introduced.

2026 Wrench Attacks Overview

2026 Wrench Attacks Overview

After the publication of our February 2026 Wrench Attacks Report, we now look at the continued escalation of wrench attacks, which have become a structural threat for cryptocurrency holders.

CertiK Expands AI-Native Security with Agent Integrations and AI Auditor

CertiK Expands AI-Native Security with Agent Integrations and AI Auditor

AI Auditor was originally built as an internal tool for CertiK’s own auditors, but is now available to the public after more than six months of rigorous application. In evaluations against 35 real-world Web3 security incidents from 2026, AI Auditor achieved an 88.6% cumulative exact hit rate, all while being engineered specifically to deliver high detection with exceptionally low noise.

Gate Wallet Integrates CertiK Skynet Scores Into Its Earn Platform

Gate Wallet Integrates CertiK Skynet Scores Into Its Earn Platform

Gate's Web3 Wallet now displays CertiK Skynet Scores directly within its Earn product pages, giving users on-chain security intelligence at the point of investment decision-making.

CertiK Completes Proof of Reserves  Verification for Gate Dubai

CertiK Completes Proof of Reserves Verification for Gate Dubai

CertiK has completed an independent Proof of Reserves (PoR) audit for Gate Technology FZE, the Dubai-based entity of the Gate Group. Gate Dubai exchange is licensed by the Virtual Assets Regulatory Authority (VARA). The audit verified that the platform's on-chain reserves fully back its user liabilities across all in-scope assets as of December 31, 2025.

The Rise of the Agent Economy, Part 2:  Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

The Rise of the Agent Economy, Part 2: Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

Standards like EIP-8004 and EIP-8183 are strong foundations, but as we build more complex layers, such as scoring systems, hooks, and AI evaluators, new risks are introduced.

2026 Wrench Attacks Overview

2026 Wrench Attacks Overview

After the publication of our February 2026 Wrench Attacks Report, we now look at the continued escalation of wrench attacks, which have become a structural threat for cryptocurrency holders.

The Rise of the Agent Economy, Part 1: How EIP-8004, EIP-8183, and x402 Turn AI Agents into Sovereign Economic Actors

The Rise of the Agent Economy, Part 1: How EIP-8004, EIP-8183, and x402 Turn AI Agents into Sovereign Economic Actors

By integrating three critical technical pillars—Identity (EIP-8004), Commerce (EIP-8183), and Payments (x402)—we can build an open machine economy where AI agents operate as sovereign economic actors, secured by trustless primitives rather than centralized gatekeepers.

Skynet DPRK Crypto Threats Report
새로운 · 보고서 ·보안 보고서

Skynet DPRK Crypto Threats Report

Our Skynet DPRK Crypto Threats Report discusses key North Korean hacker trends, including amounts stolen, number of incidents, and the most substantial hacks over the past 10 years.

In-Depth Research on the Telegram Escrow Market: Platform Evolution, Ecosystem Structure, and Regulatory Challenges
새로운 · 보고서 ·산업 연구

In-Depth Research on the Telegram Escrow Market: Platform Evolution, Ecosystem Structure, and Regulatory Challenges

The Telegram escrow market has gradually evolved into an underground service ecosystem that integrates escrow matching, fund settlement, merchant management, and traffic distribution, showing clear signs of “platformization” and network-based development.

Skynet State of Digital Asset Regulations Report

Skynet State of Digital Asset Regulations Report

For companies operating or planning to scale globally, the implications are that multi-jurisdictional licensing is now a baseline requirement; AML compliance budgets must align with the scale of enforcement; and security audits are recurring, jurisdiction-specific costs, rather than one-time exercises.

Skynet DPRK Crypto Threats Report
새로운 · 보고서 ·보안 보고서

Skynet DPRK Crypto Threats Report

Our Skynet DPRK Crypto Threats Report discusses key North Korean hacker trends, including amounts stolen, number of incidents, and the most substantial hacks over the past 10 years.

The Rise of the Agent Economy, Part 2:  Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

The Rise of the Agent Economy, Part 2: Security Deep Dive into EIP-8004, EIP-8183, Hooks, and Evaluators

Standards like EIP-8004 and EIP-8183 are strong foundations, but as we build more complex layers, such as scoring systems, hooks, and AI evaluators, new risks are introduced.

2026 Wrench Attacks Overview

2026 Wrench Attacks Overview

After the publication of our February 2026 Wrench Attacks Report, we now look at the continued escalation of wrench attacks, which have become a structural threat for cryptocurrency holders.

ZK 보안: 두 개의 ZK 버그 이야기

ZK 보안: 두 개의 ZK 버그 이야기

In our previous video, we discussed Advanced Formal Verification of ZKP: Verifying a ZK Instruction. By formally verifying each zkWasm instruction, we were able to completely verify the technical security and correctness of the entire zkWasm circuit. In this video, we will focus on the bug discovery aspect, examining specific bugs encountered during the process and the lessons learned.

Skynet Quest 소개 : The Web3 Security Journey of a Lifetime

Skynet Quest 소개 : The Web3 Security Journey of a Lifetime

Skynet Quest is a brand new platform that unlocks Web3 security with engaging learning experiences and tools. By completing quests, users gain practical knowledge of Web3 security, earn rewards, and unlock valuable tools. Whether you're a novice or an expert, Skynet Quests has something to teach everyone.

The $5 Million Bug: Identifying and Resolving a Critical Flaw in a Bridge Contract

The $5 Million Bug: Identifying and Resolving a Critical Flaw in a Bridge Contract

In December 2023, we shared an Aptos-related bug report with the Wormhole Bug Bounty Program. We were impressed at Wormhole’s quick and effective resolution of the issue. A patch resolved the issue within 3.5 hours of the initial report.