지금 프로젝트를 보호하세요
최대 규모의 웹3 보안 제공업체로 프로젝트를 강화하세요.
CertiK 보안 전문가가 귀하의 요청을 검토 후 곧 연락드리겠습니다.

CertiK 블로그

Web3의 기관화가 본격화되는 흐름에 맞춰 보안 연구, 규제 동향 및 데이터 분석을 통해 업계 변화를 실행 가능한 의사결정 인사이트로 전환합니다.

가장 밝은 부분 · 보고서· 보안 보고서

2026년 3월 12일

Skynet 암호화폐 ATM 사기 보고서

암호화폐 ATM 사기는 미국에서 가장 빠르게 증가하고 있는 금융 범죄 유형 중 하나로 자리 잡았습니다. 범죄 조직들은 암호화폐 키오스크의 빠른 거래 속도와 가명성(pseudonymity)을 악용해 취약한 계층으로부터 자금을 갈취하는 활동을 점점 더 빠른 속도로 확대하고 있습니다. Skynet 암호화폐 ATM 사기 보고서에서는 암호화폐 ATM 공격의 유형, 글로벌 통계, 공격자 프로파일, 주요 법 집행 사례, 탐지 및 대응 전략, 그리고 이러한 사기로부터 보호하기 위한 권고 사항을 다룹니다.

더 읽어보기
가장 밝은 부분 · 보고서· 산업 연구

2026년 2월 10일

2026 Skynet Prediction Markets Report

Prediction markets crossed into the mainstream in 2025, with annual trading volume growing 4x and a small number of dominant platforms emerging. Kalshi, Polymarket, and Opinion now control the vast majority of global volume, each pursuing distinct regulatory and technical strategies.

더 읽어보기
가장 밝은 부분 · 보고서· 보안 보고서

2026년 2월 2일

Skynet Wrench Attacks Report

In 2025, wrench attacks unfortunately crossed a critical threshold. What was once treated as an edge-case risk has become a structural threat to digital asset ownership. Attackers are no longer acting opportunistically; they are operating as organized, transnational groups that combine OSINT-driven targeting, social engineering, and extreme physical violence to extract private keys.

더 읽어보기
가장 밝은 부분 · 보고서· 보안 보고서

2025년 12월 23일

CertiK, 2025년 Skynet Hack3d 보안 보고서 발표!

CertiK이 2025 Skynet Hack3D 보안 보고서를 발표했습니다. 본 보고서는 블록체인 및 스마트 컨트랙트 보안을 규정하는 주요 공격 사례, 취약점, 그리고 트렌드를 심층적으로 분석합니다. 또한 개별 사건에 대한 상세 분석과 기술적 인사이트는 물론, Web3 업계 전반의 해킹·사기·취약점 악용 사례에 대한 가장 포괄적인 통계가 담겨 있습니다.

더 읽어보기

최근 게시물

모두 보기
Resolv Protocol Incident Analysis
새로운 · 보고서 ·사고 분석

Resolv Protocol Incident Analysis

On 22 March 2026, the Revolv protocol was exploited, resulting in a loss of ~$26.8M due to a compromise of the project's cloud infrastructure which gave access to Resolv’s AWS Key Management Service (KMS).

Security Readiness Accelerates Regulatory Approval for VASPs

Security Readiness Accelerates Regulatory Approval for VASPs

Security infrastructure is becoming a common bottleneck in VASP licensing. This guide covers what regulators evaluate, the documentation gaps that trigger follow-up cycles, and a practical sequencing framework to get ahead of them.

Movie Token Incident Analysis
새로운 · 보고서 ·사고 분석

Movie Token Incident Analysis

On 10 March 2026, the Movie Token (MT) contract was exploited for approximately $242,000 due to a critical flaw in its 'sell' logic. The vulnerability stemmed from a double-counting error: when a user sold MT tokens, the contract simultaneously transferred them to the liquidity pair for the swap and added that same balance to a pendingBurnAmount variable. When distributeDailyRewards() subsequently burned those pending tokens, it created an artificial supply shock, inflating the MT price and allowing the attacker to drain value from the pool.

CertiK Completes Proof of Reserves  Verification for Gate Dubai

CertiK Completes Proof of Reserves Verification for Gate Dubai

CertiK has completed an independent Proof of Reserves (PoR) audit for Gate Technology FZE, the Dubai-based entity of the Gate Group. Gate Dubai exchange is licensed by the Virtual Assets Regulatory Authority (VARA). The audit verified that the platform's on-chain reserves fully back its user liabilities across all in-scope assets as of December 31, 2025.

Slow and Steady Progress Toward U.S. Crypto Legislation

Slow and Steady Progress Toward U.S. Crypto Legislation

An overview of regulatory developments in the United States in February 2026, including the Senate Banking draft, GENIUS Act implementation, and the SEC “Task Force” transition.

Top 10 AI Agent Projects on BNB Chain

Top 10 AI Agent Projects on BNB Chain

The Top10 AI Agent Projects on BNB Chain showcases the most trending AI Agent projects based on Skynet Score. These rankings reflect a comprehensive evaluation of security posture, operational maturity, market presence, and ecosystem traction. As autonomous on-chain agents gain adoption, security and infrastructure reliability remain the primary determinants of sustainable growth and institutional trust.

Security Readiness Accelerates Regulatory Approval for VASPs

Security Readiness Accelerates Regulatory Approval for VASPs

Security infrastructure is becoming a common bottleneck in VASP licensing. This guide covers what regulators evaluate, the documentation gaps that trigger follow-up cycles, and a practical sequencing framework to get ahead of them.

Hiding in Plain Sight: zERC20 and zk-Proof-of-Burn

Hiding in Plain Sight: zERC20 and zk-Proof-of-Burn

For years, the industry has struggled with this exact question. In this article, we are going to dive deep into an emerging privacy solution: zERC20. zERC20 is a pragmatic, immediate implementation of a concept known as plausible deniability (originally proposed in EIP-7503), which means the cryptographic evidence of an action equally supports a completely innocent explanation. For zERC20, depositing funds into the privacy protocol is mathematically indistinguishable from a user accidentally sending tokens to a dead address.

The Counterparty Challenge in Institutional Crypto

The Counterparty Challenge in Institutional Crypto

When an institution sends digital assets to an address provided by a counterparty, it is relying on the counterparty's claim that they control it. The blockchain will settle the transaction regardless of who is on the other end. This gap between how institutions want to use digital assets and what the compliance infrastructure can actually verify is becoming harder to ignore as more regulated capital moves on-chain.

Resolv Protocol Incident Analysis
새로운 · 보고서 ·사고 분석

Resolv Protocol Incident Analysis

On 22 March 2026, the Revolv protocol was exploited, resulting in a loss of ~$26.8M due to a compromise of the project's cloud infrastructure which gave access to Resolv’s AWS Key Management Service (KMS).

Movie Token Incident Analysis
새로운 · 보고서 ·사고 분석

Movie Token Incident Analysis

On 10 March 2026, the Movie Token (MT) contract was exploited for approximately $242,000 due to a critical flaw in its 'sell' logic. The vulnerability stemmed from a double-counting error: when a user sold MT tokens, the contract simultaneously transferred them to the liquidity pair for the swap and added that same balance to a pendingBurnAmount variable. When distributeDailyRewards() subsequently burned those pending tokens, it created an artificial supply shock, inflating the MT price and allowing the attacker to drain value from the pool.

Skill Scanning Is Not a Security Boundary
새로운 · 보고서 ·산업 연구

Skill Scanning Is Not a Security Boundary

OpenClaw is an open-source, self-hosted personal AI agent platform designed to run on a user’s local machine or server. It supports long-term memory, autonomous operation, integration with mainstream LLMs, and remote control through messaging platforms like Telegram.

Resolv Protocol Incident Analysis
새로운 · 보고서 ·사고 분석

Resolv Protocol Incident Analysis

On 22 March 2026, the Revolv protocol was exploited, resulting in a loss of ~$26.8M due to a compromise of the project's cloud infrastructure which gave access to Resolv’s AWS Key Management Service (KMS).

Security Readiness Accelerates Regulatory Approval for VASPs

Security Readiness Accelerates Regulatory Approval for VASPs

Security infrastructure is becoming a common bottleneck in VASP licensing. This guide covers what regulators evaluate, the documentation gaps that trigger follow-up cycles, and a practical sequencing framework to get ahead of them.

Movie Token Incident Analysis
새로운 · 보고서 ·사고 분석

Movie Token Incident Analysis

On 10 March 2026, the Movie Token (MT) contract was exploited for approximately $242,000 due to a critical flaw in its 'sell' logic. The vulnerability stemmed from a double-counting error: when a user sold MT tokens, the contract simultaneously transferred them to the liquidity pair for the swap and added that same balance to a pendingBurnAmount variable. When distributeDailyRewards() subsequently burned those pending tokens, it created an artificial supply shock, inflating the MT price and allowing the attacker to drain value from the pool.

ZK 보안: 두 개의 ZK 버그 이야기

ZK 보안: 두 개의 ZK 버그 이야기

In our previous video, we discussed Advanced Formal Verification of ZKP: Verifying a ZK Instruction. By formally verifying each zkWasm instruction, we were able to completely verify the technical security and correctness of the entire zkWasm circuit. In this video, we will focus on the bug discovery aspect, examining specific bugs encountered during the process and the lessons learned.

Skynet Quest 소개 : The Web3 Security Journey of a Lifetime

Skynet Quest 소개 : The Web3 Security Journey of a Lifetime

Skynet Quest is a brand new platform that unlocks Web3 security with engaging learning experiences and tools. By completing quests, users gain practical knowledge of Web3 security, earn rewards, and unlock valuable tools. Whether you're a novice or an expert, Skynet Quests has something to teach everyone.

The $5 Million Bug: Identifying and Resolving a Critical Flaw in a Bridge Contract

The $5 Million Bug: Identifying and Resolving a Critical Flaw in a Bridge Contract

In December 2023, we shared an Aptos-related bug report with the Wormhole Bug Bounty Program. We were impressed at Wormhole’s quick and effective resolution of the issue. A patch resolved the issue within 3.5 hours of the initial report.