CertiK Blog and News
Join Our Community Today!
CertiK Works with Most Protocol to Audit MostERC20
CertiK | Aug 14
Most Protocol brings algorithmic-stable tokens into the crypto world in a fully trustless manner.
2020/08/13 Yam Finance Smart Contract Bug Analysis & Future Prevention
CertiK | Aug 13
In the case of this bug, an excess of YAM tokens would be printed, causing a larger supply to dilute the intended price, meaning that the value of each YAM token would decrease--hurting investors.
Is Your Blockchain Explorer Safe from Denial-of-Service (DoS) Attacks?
CertiK | Jul 28
In this article, we’ll discuss some of the mistakes that developers made that led to a DoS attack, the impact of a DoS attack, and recommendations on how to protect the application.
CertiK’s Audit of the Torus Distributed Key Generation Protocol
CertiK | Jul 22
A series of thorough security assessments was carried out for Torus to audit and verify the Distributed Key Generation protocol.
An Analysis of How Attackers Stole 337 BTC From Cashaa’s Bitcoin Wallets
CertiK | Jul 16
In just half a day, attackers stole a total of 337 BTC stored in Cashaa-owned wallets. CertiK’s security researchers investigate and analyze the attack in detail.