CertiK Logo
Products
Company
CertiK Resources
Blogs, Latest News, Announcements, and more
Just three months after our last funding round where we announced we were nearly a $1 Billion company, here we are again, announcing that now we are a $2 Billion company. We are excited to bring on a new set of investors, as well as receive continued funding support from existing ones.
4/6/2022
CertiK's Listen & Learn - Celer Network & Electric Sheep NFT
Podcast
Listen to our chat with Celer Network and Electric Sheep for an #AMA discussing #NFT and Crosschain Security. Broadcasted April 29th, 14:00 UTC/10 AM EST https://www.certik.com/ https://www.celer.network/ https://discord.com/invite/ultiverse
5/3/2022
Security in 60 Seconds - Hoge
Video
Auditing is a complicated and essential step in the security process. At CertiK, we review the top DeFi projects to help you better understand the findings from our experts. HOGE is an ERC20 token on the Ethereum blockchain. It has a 2% tax on every transaction. One-half of that tax is transferred back to wallet holders. The other half is burned forever.. This audit covers Hoge on the Ethereum platform. The summary describes the audit and the types of analyses used. Overview shows the programming language, the blockchain used, and a link to the project's codebase. The Vulnerability Summary lists issues that need resolution. Audit Scope displays which contracts were audited. Findings highlight all issues and ranks them in terms of severity from critical to discussion. In this audit, we found 0 Critical, 0 Major, 0 Medium, 2 Minor, and 3 Informational issues. The Hoge team has acknowledged all of the issues. Visit CertiK.com for the full report.
5/3/2022
Security in 60 Seconds - Position Exchange
Video
Auditing is a complicated and essential step in the security process. At CertiK, we review the top DeFi projects to help you better understand the findings from our experts. Position Exchange is The Next-Gen Decentralized Trading & Crypto Platform with a whole Ecosystem running fully on-chain. This audit covers Position Exchange on the Binance Smart Chain platform. The summary describes the audit and the types of analyses used. Overview shows the programming language, the blockchain used, and a link to the project's codebase. The Vulnerability Summary lists issues that need resolution. Audit Scope displays which contracts were audited. Findings highlight all issues and ranks them in terms of severity from critical to discussion. In this audit, we found 0 Critical, 2 Major, 2 Medium, 3 Minor, and 1 Informational issues. Position Exchange has all of the issues pending. Visit CertiK.com for the full report.
5/2/2022
What is a Reentrancy Attack?
Technology
This blog post will take you through one of the most infamous exploits in [blockchain security](https://www.certik.com/): the reentrancy attack, and best practices for defending against them
5/2/2022
Security in 60 Seconds - Kava
Video
New Security in 60 Seconds episode Give us 1 minute, we'll give you the findings. Check out the review of KAVA's audit report on CertiK's Security Leaderboard. https://certik.com/projects/kava Auditing is a complicated and essential step in the security process. At Certik, we review the top DeFi projects to help you better understand the findings from our experts. Kava is a lightning-fast Layer-1 blockchain that combines the Ethereum and Cosmos ecosystems into a single, scalable, network. This audit covers the Kava Swap Module on the CosmosSDK platform. The project summary describes the audit and the types of analyses used. Overview shows the programming language, the blockchain used, and a link to the project's codebase. The Vulnerability Summary lists issues that need resolution. The Audit Scope displays which contracts were audited. Findings highlight all issues and ranks them in terms of severity from critical to discussion. In this audit, we found 0 Critical, 0 Major, 0 Medium, 3 Minor, and 4 Informational issues. The Kava team has acknowledged all of the issues. Visit CertiK.com for the full report.
4/30/2022
Security in 60 Seconds - Ceek
Video
New Security in 60 Seconds episode Give us 1 minute, we'll give you the findings. Check out the review of CEEK's audit report on CertiK's Security Leaderboard. https://certik.com/projects/ceek Transcript: Auditing is a complicated and essential step in the security process. At Certik, we review the top DeFi projects to help you better understand the findings from our experts. Ceek, is an award-winning developer of premium social virtual, and augmented reality experiences. This audit covers the CEEK token on the Binance Smart Chain platform. The project summary describes the audit and the types of analyses used. Overview shows the programming language, the blockchain used, and a link to the project's codebase. The Vulnerability Summary lists issues that need resolution. The Audit Scope displays which contracts were audited. Findings highlight all issues and ranks them in terms of severity from critical to discussion. In this audit, we found 0 Critical, 0 Major, 0 Medium, 1 Minor, and 2 Informational issues. The Ceek team has acknowledged the Minor issue. Visit CertiK.com for the full report.
4/29/2022
What is a Mintable Token?
Technology
Trying to get your head around the difference between ‘mintable tokens’ and ‘mineable tokens’ can be a complicated affair, primarily because there is a lot of slippage in the terminology between the two. The difference is that to mint new tokens through mining requires a lot more time, resources and effort.
4/29/2022
What is Pseudonymity and Anonymity?
Technology
The debate between the importance of maintaining pseudonymity and anonymity or implementing regulation is still very much ongoing, and whilst it can be heated at times, it is a necessary conversation if cryptocurrencies are to reach widespread adoption.
4/22/2022
CertiK Receives Additional $60 Million in Funding, from SoftBank
Announcements
We are pleased to announce an additional $60 million USD investment from SoftBank Vision Fund 2 and Tiger Global, bringing the total amount invested to $290 million.
4/22/2022
What is dApp Security?
Technology
The systematic set up of decentralized apps unfortunately leaves them susceptible to hackers in some situations. As more businesses migrate to dApps and other cloud-based structures, it is important to keep safety and security in mind. Even as technology changes, cybercriminals will look for ways to infiltrate it.
4/8/2022
CertiK Doubles Its Valuation to $2 Billion in Just 3 Months
Announcements
Just three months after our last funding round where we announced we were nearly a $1 Billion company, here we are again, announcing that now we are a $2 Billion company. We are excited to bring on a new set of investors, as well as receive continued funding support from existing ones.
4/6/2022
What is Tornado Cash?
Technology
One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have ever taken place, is globally visible. However Tornado Cash believes a fundamental principle is that privacy is a human right, and the more everyone adopts privacy measures, the more secure it is for all of us.
3/29/2022
Security in 60 Seconds - BabyDoge
Video
Give us 1 minute, we'll give you the findings. Check out the review of BabyDoge's audit report on CertiK's Security Leaderboard to learn more.
3/15/2022
Security in 60 Seconds - 1inch Network
Video
Give us 1 minute, we'll give you the findings. Check out the review of 1inch Network's audit report on CertiK's Security Leaderboard to learn more.
3/15/2022
Security in 60 Seconds - VCGamers
Video
Give us 1 minute, we'll give you the findings. Check out the review of VCGamers's audit report on CertiK's Security Leaderboard to learn more.
3/15/2022
Security in 60 Seconds - Lunar
Video
Give us 1 minute, we'll give you the findings. Check out the review of Lunar's audit report on CertiK's Security Leaderboard to learn more.
3/15/2022
What is a Crypto Scam?
Technology
With an influx of new users and the DeFi boom, crypto scams were more prominent than ever. There are a few things that users can do to protect themselves from these crypto scams, but first we need to know what types of crypto scams there are and what to look out for.
3/7/2022
What is On-Chain Monitoring?
Technology
DeFi security goes far beyond smart contract audits. On-chain monitoring provides crypto traders with a fascinating tool to delve into the real-time insights of a blockchain network. This gives the opportunity to capitalize on the advantages offered by a more data-abundant and transparent crypto market.
3/4/2022
What is a Blockchain Replay Attack?
Technology
Despite being designed to be tamper-proof, democratic, and immutable, blockchain technology is not immune to cyberattacks. In this post, let’s take a look at one of the most prominent cyberattacks that affect blockchain technology today: replay attacks. ⁠
2/28/2022
What is Blockchain Security
Technology
Blockchain security is one of the biggest hurdles to mass adoption and is one of the biggest worries for outsiders not involved in the space. To really understand blockchain security, the risks, and ways to minimize the risk, we must first truly understand what blockchain is.
2/18/2022
What is Blockchain Analysis?
Technology
Blockchain analysis is the process of inspecting, cataloging, and interpreting the data that blockchains produce in order to gain actionable insights. It can also help you take control of your own personal security, by displaying exactly how much traceable information every transaction creates. As more and more value shifts onto public blockchains, it’s worth remembering that all activity is out in the open, viewable by anyone and everyone.
2/18/2022
What to Learn From Recent Cross-Chain Bridge Attacks
Technology
The growth of new blockchains has created additional complexity and risk in the crypto ecosystem. Cross-chain bridges are new attack vectors with inherent security limits that users and project teams should be aware of. In 2022 alone, three major attacks have already occurred on cross-chain bridges. Some key lessons learned from these attacks:
2/11/2022
What is Centralization Risk?
Technology
Centralization risk at its core is a single point of failure within a DeFi protocol. Smart contracts with centralized ownership are riskier than contracts with a timelock or multi-signature key ownership. In smart contract audits, this is the most common major issue pointed out by the CertiK security experts
2/4/2022
What Is DeFi Security
Technology
The total TVL (Total Value Locked) in DeFi protocols reached over $75B in 2021. With these kinds of numbers, the importance of DeFi security is clear. There are numerous measures in place to help combat these hacks and exploits
1/28/2022