Crowdsourced security

Fault Proofs 101: The Backbone of OP Stack Security
  • Discover

Fault Proofs 101: The Backbone of OP Stack Security

While zero‑knowledge integrations such as OP Succinct inch closer to production, most of the value locked in Layer‑2 still depends on “optimistic” assumptions – thanks to simpler design, stronger tooling, and years of battle‑testing. That puts Optimism’s Fault Proof System on center stage as the last line of defense for billions in L2 value. Fault Proofs 101

8 May 2025

Actionable DeFi Security Lessons from Compound’s Incidents
  • Discover

Actionable DeFi Security Lessons from Compound’s Incidents

Decentralized Finance (DeFi) protocols have revolutionized financial services, offering permissionless lending, borrowing, and trading. And despite market fluctuations, DeFi protocols held over $100 billion in Total Value Locked (TVL) as of May 2025. This concentration of value makes robust security paramount. Pioneering lending protocols like Compound (founded in 2017, with major versions V2 in 2019

7 May 2025

Uniswap V2 Core Contracts: Technical Details & Risks
  • Discover

Uniswap V2 Core Contracts: Technical Details & Risks

Uniswap V2 (main-net launch 18 May 2020) is still responsible for ~40 % of Uniswap TVL on Ethereum mainnet and many L2 roll-ups despite V3/V4 advances. Integrators therefore inherit its design trade-offs and latent attack surface.  Many articles describe the main ideas of the protocol, and the contracts are considered secure due to their long

7 May 2025

Hack:Pot: Scaling Flash Pools into an Industry-Grade Web3 Security Platform
  • Hacken News
  • Industry News

Hack:Pot: Scaling Flash Pools into an Industry-Grade Web3 Security Platform

The DualDefense Flash Pools MVP successfully demonstrated the viability of real-yield security staking, proving that decentralized audit pools can create a more secure Web3 environment. However, one major challenge emerged: the limited number of pools available under the initial framework. To make a real impact, we need a broader, more scalable solution. With this goal,

15 Apr 2025

Enterprise Blockchain Security: Strategic Guide for CISOs and CTOs
  • Discover
  • cybersecurity

Enterprise Blockchain Security: Strategic Guide for CISOs and CTOs

Enterprise adoption of blockchain presents significant opportunities but introduces complex cybersecurity challenges that demand C-suite attention. While the technology promises decentralization and efficiency, the transition from Web2 requires navigating immature security practices and novel threat vectors. Failure to address these risks proactively leads not just to financial loss, but to severe reputational damage, regulatory penalties,

9 Apr 2025

How Uniswap V4’s Truncated Oracle Addresses TWAP Vulnerabilities
  • Discover
  • uniswap
  • +1

How Uniswap V4’s Truncated Oracle Addresses TWAP Vulnerabilities

DeFi lending protocols rely heavily on accurate price oracles for determining collateral values, borrowing limits, and triggering liquidations. Traditional Time-Weighted Average Price (TWAP) oracles, while widely adopted, are inherently susceptible to price manipulation, resulting in potentially devastating unfair liquidations and systemic market inefficiencies. The introduction of Uniswap V4’s Truncated Oracle aims to address these critical

2 Apr 2025

Web3 Security Report Q1 2025: $2B Lost in 90 Days
  • Insights
  • Web3 Security Report

Web3 Security Report Q1 2025: $2B Lost in 90 Days

The first quarter of 2025 marked one of the most alarming periods in Web3 security history — with over $2 billion lost in just three months. A 96% increase compared to Q1 2024. What’s behind this staggering number? The story points to operational failures, access control exploits, and a persistent pattern of multisig compromises. What’s

2 Apr 2025

Mastering Transient Storage in Uniswap V4
  • Discover
  • cybersecurity
  • +1

Mastering Transient Storage in Uniswap V4

This article is part of a series exploring security considerations in Uniswap V4. In our previous article, Auditing Uniswap V4 Hooks: Risks, Exploits, and Secure Implementation, we analyzed potential vulnerabilities in hooks and best practices for secure integration. Here, we focus on the security implications of transient storage (EIP-1153) and its impact on Uniswap V4.

25 Mar 2025

Assets Verified: Hacken’s Ongoing Proof of Reserves for Bybit
  • Case Studies
  • CEX
  • +1

Assets Verified: Hacken’s Ongoing Proof of Reserves for Bybit

Bybit, a leading cryptocurrency exchange, has been conducting monthly Proof of Reserves (PoR) audits with Hacken since June 2024. This transparency initiative proved critical during the recent $1.5B hack, helping stabilize withdrawals and reinforce user confidence. Bybit’s latest PoR audit, verified by Hacken on February 26, 2025, confirmed that Bybit maintains a reserve ratio exceeding

14 Mar 2025

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo