What Is DeFi Security

  • Permissionless
  • Immutability
  • Transparency
  • Lending and Borrowing Applications
  • Tokenization

Admin Key Compromise

Coding Mistakes

  • Function permission(modifier)
  • Typos
  • Incorrect number of digits
  • Missing/incorrect variable value assignment

Flash Loans and Price Manipulation

Misuse of Third-Party Protocols and Business Logic Errors

What CertiK is Doing to Help




Official Website: https://certik.com

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

👋Hello EVOnity Family!👋

SOMESING Token Swap Announcement

[ Photo ] 🌹Hello dearest Members.!! How are you all?

Object-Oriented Malware — Some Dude Says

HOW TO: Vote On Brokoli Network Climate Parliament DAO 🌳🚀

Exploiting weak configurations in Google Identity Platform

Secret IBC Bridge Tutorial

{UPDATE} Castles of Mad King Ludwig Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


Official Website: https://certik.com

More from Medium

Weekly Blockchain Security Report by Fairyproof- Feb 21 to Feb 27

Hacker abuses OpenSea to buy NFTs at older, cheaper prices🌊

Knownsec Blockchain Lab | Discussion on the extractable value of miners (MEV)

Badger DAO Protocol’s $120 Million Exploit