Protect Your Project Today
Strengthen your project with the largest web3 security provider.
A CertiK security expert will review your request and follow up shortly.

Technical Blogs

Web3 Penetration Testing: A Practical Guide

Web3 Penetration Testing: A Practical Guide

How Web3 penetration testing secures smart contracts, wallets, and infrastructure through real-world attack simulation, standardized methodologies, and actionable remediation.

OpenClaw Security Report

OpenClaw Security Report

The rapid adoption of OpenClaw, a popular open-source autonomous AI agent framework, reflects a broader shift toward AI-driven assistants. However, the widespread integration of this framework introduces critical security risks that may lead to unauthorized actions, data exposure, and system compromise.

Security Readiness Accelerates Regulatory Approval for VASPs

Security Readiness Accelerates Regulatory Approval for VASPs

Security infrastructure is becoming a common bottleneck in VASP licensing. This guide covers what regulators evaluate, the documentation gaps that trigger follow-up cycles, and a practical sequencing framework to get ahead of them.

Hiding in Plain Sight: zERC20 and zk-Proof-of-Burn

Hiding in Plain Sight: zERC20 and zk-Proof-of-Burn

For years, the industry has struggled with this exact question. In this article, we are going to dive deep into an emerging privacy solution: zERC20. zERC20 is a pragmatic, immediate implementation of a concept known as plausible deniability (originally proposed in EIP-7503), which means the cryptographic evidence of an action equally supports a completely innocent explanation. For zERC20, depositing funds into the privacy protocol is mathematically indistinguishable from a user accidentally sending tokens to a dead address.

The Counterparty Challenge in Institutional Crypto

The Counterparty Challenge in Institutional Crypto

When an institution sends digital assets to an address provided by a counterparty, it is relying on the counterparty's claim that they control it. The blockchain will settle the transaction regardless of who is on the other end. This gap between how institutions want to use digital assets and what the compliance infrastructure can actually verify is becoming harder to ignore as more regulated capital moves on-chain.

Stablecoin Compliance in the Age of Agentic Commerce

Stablecoin Compliance in the Age of Agentic Commerce

In February 2026, an AI agent named Lobstar Wilde gave away tokens worth up to $450,000 to a stranger on X. The stranger had posted a sob story about needing 4 SOL for his uncle's tetanus treatment. Lobstar Wilde, an autonomous agent running on Solana with a live wallet, read the post and sent 52 million tokens. Not 4 SOL. Five percent of its entire token supply. The developer later explained that a session crash had wiped the agent's memory. It forgot what it owned, misread a social media post as a legitimate request, and signed an irreversible on-chain transfer. No compliance system flagged the transaction. No human reviewed it. The money just moved. This is a preview of what agentic commerce looks like without proper compliance infrastructure.

Technical Deep Dive | CertiK Helped Fix a DoS Vulnerability in Solana’s Big-Integer Modular Exponentiation

Technical Deep Dive | CertiK Helped Fix a DoS Vulnerability in Solana’s Big-Integer Modular Exponentiation

This article takes an in-depth look at the importance of blockchain transaction fee models and their critical role in ensuring network security and efficient operation. By comparing the transaction fee models of Ethereum and Solana, it highlights how unsafe transaction pricing can introduce network security risks. The article especially focuses on a compute-unit (CU) accounting error in Solana’s big-integer modular exponentiation syscall discovered and reported by the CertiK team, which could lead to a potential remote DoS attack. It further analyzes Solana’s smart-contract pricing model, PoH-related timing mechanics, and parallel transaction processing, and reproduces the remote DoS process and cost via experiments on a private Solana cluster.

The Importance of Having a Bug Bounty Program for Your Blockchain Project

The Importance of Having a Bug Bounty Program for Your Blockchain Project

Learn why having a bug bounty program is crucial for your blockchain project. Discover how it helps identify vulnerabilities, improve security, and build trust with users.

Designing Proof of Reserves for Tokenized Gold

Designing Proof of Reserves for Tokenized Gold

When you buy a real world asset like tokenized gold, the token lives on-chain, but the gold does not. It sits in a vault, managed by a custodian, documented through paper records and serial numbers. The chain confirms you own the token, but it cannot confirm the gold exists.

What are Stablecoins?

What are Stablecoins?

Types of stablecoins, how they work, use cases, and common risks, including de-pegs, liquidity, and compliance. Learn more about stablecoins before you transact with them.

Top Crypto Security Vectors to Look Out For in 2026

Top Crypto Security Vectors to Look Out For in 2026

2026 represents a critical juncture in the security of digital assets. As the crypto ecosystem continues to institutionalize, threats are evolving, driven by the industrialization of artificial intelligence and the emergence of new vulnerabilities.

Building Secure Lightning Network dApps: Best Practices and Secure Check Lists

Building Secure Lightning Network dApps: Best Practices and Secure Check Lists

This post focuses on security areas that matter the most in real Lightning dApps. It is written from an audit perspective: what consistently causes loss of funds and stuck funds, common attack surfaces, and how developers can prevent them.

Showing 1-12 of 138 items