dApp

Secure Code Review and Privacy-Centric ZK Credential Audit For Mina Protocol
  • Case Studies
  • dApp

Secure Code Review and Privacy-Centric ZK Credential Audit For Mina Protocol

Overview Mina is the leading layer-1 blockchain focused on zero-knowledge (ZK) privacy. With its lightweight 22kb “proof of everything,” Mina enables users to verify data from web services, blockchains, or real-world credentials without revealing sensitive information. It supports a new generation of dApps and verifiable use cases spanning identity, voting, DeFi, real-world assets, and gaming.

28 May 2025

Real-World Examples of dApps, Lessons Learned & Strategies for Protecting Every Layer
  • Discover
  • dApp

Real-World Examples of dApps, Lessons Learned & Strategies for Protecting Every Layer

Decentralized applications (dApps) are software that run on a decentralized network, often using blockchain technology. These applications can serve various purposes for end users, such as brokers, art collectors, traders, investors, and documents of public trust. However, their functionality and value attract malicious groups aiming to exploit vulnerabilities for financial gain. This article explores real-world examples of dApp security breaches, their attack vectors, and the lessons learned.

11 Jun 2024

dApp Security: A Proactive Guide To Building Secure Decentralized Applications
  • Discover
  • dApp
  • +1

dApp Security: A Proactive Guide To Building Secure Decentralized Applications

Hacken Lead dApp Auditor provides a proactive guide to building a robust, reliable decentralized application that inspires user trust.

8 Jun 2023

DeFi vs. dApps
  • Discover
  • dApp
  • +1

DeFi vs. dApps

What is the difference between DeFi and dApps? Both are decentralized, but what else? Find out in this article.

31 Oct 2022

Subscribe to our research

Enter your email address to subscribe to Hacken Reseach and receive notifications of new posts by email

[contact-form-7 id="8165" title="Subscribe"]

Interested in getting to know whether your systems are vulnerable to cyberattacks?

Tell us about your project

  • This field is required
  • This field is required
    • telegram icon Telegram
    • whatsapp icon WhatsApp
    • wechat icon WeChat
    • signal icon Signal
  • This field is required
  • This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Apply for partnership

  • This field is required
  • This field is required
  • This field is required
  • This field is required
    • Foundation
    • VC
    • Angel investments
    • IDO or IEO platform
    • Protocol
    • Blockchain
    • Legal
    • Insurance
    • Development
    • Marketing
    • Influencer
    • Other
This field is required
This field is required
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo

1,200+ Audited Projects

companies logos

Get in touch

  • This field is required
  • This field is required
  • This field is required
  • This field is required
This field is required
By submitting this form you agree to the Privacy Policy and information beeing used to contact you
departure icon

Thank you for your request

Get security score on

  • certified logo
  • coingeco logo
  • coin market cap logo