生态系统
Skynet Crypto ATM Fraud Report
Crypto ATM fraud is one of the fastest-growing financial crime categories in the United States. Criminal organizations exploit the speed and pseudonymity of crypto kiosks to extract funds from vulnerable populations at an accelerating pace. In the Skynet Crypto ATM Fraud Report, we discuss types of crypto ATM attacks, global statistics, attacker profiles, key enforcement actions, detection and mitigation strategies, and recommendations to protect against these types of fraud.
Hiding in Plain Sight: zERC20 and zk-Proof-of-Burn
For years, the industry has struggled with this exact question. In this article, we are going to dive deep into an emerging privacy solution: zERC20. zERC20 is a pragmatic, immediate implementation of a concept known as plausible deniability (originally proposed in EIP-7503), which means the cryptographic evidence of an action equally supports a completely innocent explanation. For zERC20, depositing funds into the privacy protocol is mathematically indistinguishable from a user accidentally sending tokens to a dead address.
The Counterparty Challenge in Institutional Crypto
When an institution sends digital assets to an address provided by a counterparty, it is relying on the counterparty's claim that they control it. The blockchain will settle the transaction regardless of who is on the other end. This gap between how institutions want to use digital assets and what the compliance infrastructure can actually verify is becoming harder to ignore as more regulated capital moves on-chain.
CertiK Completes Proof of Reserves Verification for Gate Dubai
CertiK has completed an independent Proof of Reserves (PoR) audit for Gate Technology FZE, the Dubai-based entity of the Gate Group. Gate Dubai exchange is licensed by the Virtual Assets Regulatory Authority (VARA). The audit verified that the platform's on-chain reserves fully back its user liabilities across all in-scope assets as of December 31, 2025.
Slow and Steady Progress Toward U.S. Crypto Legislation
An overview of regulatory developments in the United States in February 2026, including the Senate Banking draft, GENIUS Act implementation, and the SEC “Task Force” transition.
Stablecoin Compliance in the Age of Agentic Commerce
In February 2026, an AI agent named Lobstar Wilde gave away tokens worth up to $450,000 to a stranger on X. The stranger had posted a sob story about needing 4 SOL for his uncle's tetanus treatment. Lobstar Wilde, an autonomous agent running on Solana with a live wallet, read the post and sent 52 million tokens. Not 4 SOL. Five percent of its entire token supply. The developer later explained that a session crash had wiped the agent's memory. It forgot what it owned, misread a social media post as a legitimate request, and signed an irreversible on-chain transfer. No compliance system flagged the transaction. No human reviewed it. The money just moved. This is a preview of what agentic commerce looks like without proper compliance infrastructure.
Technical Deep Dive | CertiK Helped Fix a DoS Vulnerability in Solana’s Big-Integer Modular Exponentiation
This article takes an in-depth look at the importance of blockchain transaction fee models and their critical role in ensuring network security and efficient operation. By comparing the transaction fee models of Ethereum and Solana, it highlights how unsafe transaction pricing can introduce network security risks. The article especially focuses on a compute-unit (CU) accounting error in Solana’s big-integer modular exponentiation syscall discovered and reported by the CertiK team, which could lead to a potential remote DoS attack. It further analyzes Solana’s smart-contract pricing model, PoH-related timing mechanics, and parallel transaction processing, and reproduces the remote DoS process and cost via experiments on a private Solana cluster.
SOF/LAXO Incident Analysis
In February 2026 two separate exploits occurred on the BNB Smart Chain (BSC), affecting SOF and LAXO tokens, leveraging the same class of vulnerability: a flawed token burn mechanism that allowed price manipulation within a single transaction.
Top 10 AI Agent Projects on BNB Chain
The Top10 AI Agent Projects on BNB Chain showcases the most trending AI Agent projects based on Skynet Score. These rankings reflect a comprehensive evaluation of security posture, operational maturity, market presence, and ecosystem traction. As autonomous on-chain agents gain adoption, security and infrastructure reliability remain the primary determinants of sustainable growth and institutional trust.
The Importance of Having a Bug Bounty Program for Your Blockchain Project
Learn why having a bug bounty program is crucial for your blockchain project. Discover how it helps identify vulnerabilities, improve security, and build trust with users.
Designing Proof of Reserves for Tokenized Gold
When you buy a real world asset like tokenized gold, the token lives on-chain, but the gold does not. It sits in a vault, managed by a custodian, documented through paper records and serial numbers. The chain confirms you own the token, but it cannot confirm the gold exists.
The Enterprise DLT Oracle Challenge
In DeFi, oracle failures can cause financial losses within a system that broadly accepts risk. Enterprise DLT operates in a different world. The assets are physical. The counterparties are regulated. The consequences are legal.