CertiK Logo
Products
Company
CertiK Resources
Blogs, Latest News, Announcements, and more
CertiK audited a total of over 3700 projects to date and reported on many incidents. In this report, you will learn about
5/18/2022
Revisiting FEI Protocol Incident
Analysis Reports
On 30 April 2022, Fei Protocol announced that they were aware of and looking into an exploit on various Rari Fuse pools, that turned out to be a common re-entrancy attack.
6/27/2022
Harmony Incident Analysis
Analysis Reports
A bridge exploit occurred on Harmony’s Horizon bridge amounting to the loss of approximately $97M.
6/24/2022
Introducing: Emblem for Project Teams!
Blogs
Announcements
The CertiK Emblem comes following the launch of a new badge system designed to highlight projects that implement additional security measures beyond a Security Audit.
6/24/2022
What Can We Learn from the Luna/Terra Crash?
Blogs
On May 7th 2022, in one of the biggest upsets in crypto history, the Luna/Terra ecosystem came crashing down. This article will take you through what happened in the Luna/Terra crash, the lessons to be learned from it, and what users and web3 projects can do to help better protect themselves from the fallout of such upheavals going forward.
6/23/2022
Pragma Incident Analysis
Analysis Reports
In total, ~$1.5m was removed from the Pragma Treasury and the Risk Free Value wallet by core members of the team before sending it to a Binance hot wallet on FTM.
6/21/2022
WCEF 2022: Blockchain Security Insights and Best Practices
Videos
WCEF 2022: Blockchain Security Insights and Best Practices Monier Jalal, VP of Marketing at CertiK, discusses: -Highlights of the most impactful hacks in 2022 -Overview of common vulnerabilities -Development best practices
6/21/2022
Inverse Finance 02 April 2022
Analysis Reports
On Apr-02-2022 11:04:09 AM +UTC, Inverse Finance, which enables users to borrow assets against their tokens, was exploited, leading to ~$14.5M worth of asset loss.
6/21/2022
LV Metaverse (LV PLUS) Incident Analysis
Analysis Reports
On Tuesday, June 21st, 2022, the LV Metaverse (LV PLUS) was rugpulled, causing a loss of around $1.5M USD.
6/21/2022
Whale Loans Incident Analysis
Analysis Reports
On 20 June, Whale Finance experienced two separate exploits on the project's stablecoin AMM contracts which has led to ~$12k in losses.
6/20/2022
What is the Skynet Trust Score? | Bite Size Blockchain
Videos
Introducing the Skynet Trust Score The Skynet Trust Score is an updated version of the Security Score that users are currently familiar with on CertiK's Security Leaderboard. Check out our new video and blog explaining it: https://certik.com/resources/blog/6QngchVV4Yuzt2P3uputor-introducing-the-skynet-trust-score
6/17/2022
Inverse Finance Incident Analysis
Analysis Reports
On 16 June 2022 a threat actor exploited Inverse Finance with a flash loan attack which netted them to ~53 bitcoin or $1.1 million, and ~10,000 tether (USDT).
6/16/2022
5 Tips to Spot a Fake KYC Certificate
Blogs
Here are 5 simple indicators for determining whether a KYC certificate is fake or unreliable
6/15/2022
BNB Chain Revelation Hackathon Frontier Technologies | w/ CertiK's VP of Marketing, Monier Jalal
Videos
Announcing Revelation, a global hackathon by BNB Chain; a 50-day event packed with online workshops, in-person meetups, and $10 million in prizes and seed funding for the best competing teams. This event also kicks off BNB Long-term Grants and BNB GrantDAO, a long-term community grant initiative supporting multi-chain innovation. The dawn of MetaFi and Web3 is upon us, and the BNB Chain community is venturing into a new frontier.
6/14/2022
A Buyer's Guide to Web3 Security
Reports
Understanding web3 security can be confusing for newcomers. On the one hand, the practices of decentralization that web3 is built on making it fundamentally more secure that its web2 predecessors.
6/13/2022
How Do We Secure the Web3 World? | Ronghui Gu, CEO of CertiK | DCentral Austin, TX
Videos
Check out the Speaker Session from #DCentralCon in Austin, TX with CertiK's Co-Founder & CEO, Ronghui Gu. Watch & listen as he discusses Securing the Web3 World.
6/10/2022
Introducing the Skynet Trust Score!
Blogs
Announcements
CertiK is excited to announce the release of a new Skynet Trust Score, Cohort Analysis Panel, and Highlights and Alerts section!
6/10/2022
What is a Blockchain Vulnerability?
Blogs
In web3 security, a vulnerability refers to anything that can be leveraged by a hacker to exploit the protocol. This post will take you through some of the most common vulnerabilities that occur in blockchain, and the steps that projects and users can take to avoid them.
6/9/2022
Osmosis Incident Analysis
Analysis Reports
On June 7, 2022 Osmosis suffered a funds loss of around $5M due to a code pitfall in function `MaximalExactRatioJoin`
6/9/2022
Apollo X Incident Analysis
Analysis Reports
On June 8, 2022 ApolloX token (APX) dropped by 52.12% resulting from a hack and loss of ~$1.5M
6/9/2022
GYM Network Exploit Analysis
Analysis Reports
GYM Network deployed a new function to their smart contract, on June 08 2022, GYM Network was exploited.
6/8/2022
May Stats Graphic
Infographics
The May Stats Graphic shows datas of hacks in May, 2022.
6/7/2022
April Stats Graphic
Infographics
The April Stats Graphic shows datas of hacks in April, 2022.
6/7/2022
Bored Ape Yacht Club Discord Hit With Phishing Attack
Analysis Reports
In total, 32 NFTs were stolen from a variety of projects which included 2 MAYC, 1 BAYC, 1 BAKC and 5 Otherdeed.
6/4/2022
What is a Centralization vs Decentralization vs Distributed Networks? | Bite Size Blockchain
Videos
A new CertiK series giving users bite-size tips and info to stay informed and safe in the #crypto space. Episode 11: What is Centralization vs Decentralization vs Distributed Networks? Learn more in under 2 mins! https://www.certik.com/products/pentest Transcript: Centralization, decentralization, and distributed networks are three different systems used for storing data. Centralization has been the status quo for web technology, making websites easy to use. A centralized network processes and stores data on a specific server. They allow engineers to roll out updates and fixes to the host server. Centralized networks often hire security firms to do penetration testing, which simulates a network attack. With centralization, if a server suffers downtime the entire network grinds to a halt. Decentralization offers more security and helps mitigate attacks. A decentralized network operates across many different nodes. Each node holds the entire database and verifies its version against each other to achieve consensus. A decentralized network requires more effort to update, has a greater environmental impact through its energy consumption. A distributed network operates like a decentralized system but may not require each node to host all of its data independently. Increased transparency is a key feature with each node having equal access to the data. This also makes it difficult to change information in the network. Smart contract auditing has risen from new types of attacks on decentralized and distributed networks. Whether it be Penetration Testing or Smart Contract Auditing choosing the right technology will ensure greater success. To learn more about centralization, decentralization, and distributed networks, visit CertiK.com/resources.
6/2/2022