立刻保护您的项目
借助最大的web3安全提供商来增强您的项目。
CertiK 安全专家将审核您的请求,并尽快与您联系。

A Statement about Disclosing Bad Behaviors in Mobile Wallet Apps

消息 ·公告 ·
A Statement about Disclosing Bad Behaviors in Mobile Wallet Apps

Over the past year, our research team has identified multiple critical vulnerabilities within mobile wallets. These range from dubious and disingenuous code that sends users' private keys to servers under various excuses, to the excessive collection or unintended exposure of personal data, and to even unexplainable buggy code that leads to remote code execution.

Following responsible disclosure guidelines, we promptly informed the vendors of these issues. While reporting was generally straightforward, getting vendors to address these issues proved more challenging. At times, we had to fully exploit the vulnerability to highlight its seriousness.

Furthermore, when attempting to inform the community about these (remediated) vulnerabilities, we were generally met with resistance from vendors. Their reasons ranged from concerns about causing panic within the community to claims that there were no actual losses, suggesting there was no need for public disclosure.

Our latest investigations have uncovered several striking issues in various wallet implementations that we believe users should be aware of. These issues range from concealed functions within wallets, and mishandling private keys, to uploading sensitive information to external servers.

At CertiK, we're committed to enhancing security and transparency within the blockchain ecosystem. However, we face a challenging balance between alerting the community and honoring the confidentiality agreements with vendors. From our experience, although several vendors prioritize public disclosure, many prefer to keep these issues private, complicating shared growth.

Without disclosing these issues, however, the community never has a chance to have a healthy debate, and vendors don’t face much pressure to reconsider their practices. Therefore, we decide to introduce a new approach to improve the security of the entire Web3 community.

In the forthcoming weeks, we plan to share our insights with the community, while maintaining the anonymity of the involved vendors and withholding specific details that could facilitate exploitation. Our goal with this extended disclosure initiative is to elevate the security standards within the Web3 wallet sector, benefiting developers, auditors, and users alike.

We advocate for a culture of openness and improvement, and urge vendors to prioritize user safety and transparency. We believe that educating the community about the risks associated with wallet implementations can lead to a more secure ecosystem. By working together, we can build a safer blockchain ecosystem for everyone. It is only when every stakeholder prioritizes security above all else that the Web3 community can truly thrive and prosper.

相关博客

React/Next.js CVE-2025-55182 Vulnerability Analysis

React/Next.js CVE-2025-55182 Vulnerability Analysis

A critical vulnerability, CVE-2025-55182, was recently disclosed and carries a CVSS 10.0 (the most critical) severity rating. The issue affects React/Next.js environments. Our security research team has analyzed the vulnerability and detected many applications in the Web3 ecosystem running the affected versions, including several that are actively exploitable.

What Is a Web3 Wallet?

What Is a Web3 Wallet?

Learn what a Web3 wallet is, how it works, and the different types available. Explore features, benefits, and how Web3 wallets enable secure access to decentralized applications.

Binance Wallet Integrates CertiK’s Skynet Token Scan

Binance Wallet Integrates CertiK’s Skynet Token Scan

Binance Wallet is enhancing user security by integrating Skynet Token Scan, a powerful tool developed by CertiK’s security researchers. This new feature puts on-demand security intelligence directly into the hands of Binance Wallet users, empowering them to make safer, more informed decisions.