Security
Intelligence.

Decentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.

Total Value Lost (2026)

$7.35M

trending_up YTD

Documented Incidents

690

VERIFIED

All-Time Losses Tracked

$3.44B

On-Chain

Featured Post-Mortems

Deep-dive structural analysis of landmark vulnerabilities.

View Archive arrow_forward

Latest Security Incidents

Real-time ledger of verified exploits and security anomalies.

Date Protocol Chain Amount Type
Mar 27, 2026 EST Token BNB Chain Undisclosed Business Logic Flaw
Mar 15, 2026 Venus THE BNB Chain Undisclosed Donation Attack
Mar 10, 2026 AlkemiEarn Undisclosed Business Logic Flaw
Mar 2, 2026 Curve LlamaLend Undisclosed Price Manipulation
Feb 22, 2026 LAXO Token Undisclosed Other
Feb 15, 2026 Moonwell $1.78M Oracle Manipulation

Editorial

From the Blog

Long-form analysis, market research, and security commentary.

View All Posts arrow_forward

Security Education

Access our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.

Q: What machine learning models are compared in the study?

Neural networks (NN), support vector machines (SVM), and random forests (RF).

Q: What general conclusion does the study draw about cryptocurrency holdings?

Cryptocurrency holdings can have both positive and negative impacts on sustainable performance, influenced by external and internal financial conditions.

Security Analysis UI
verified_user

Verified Methodology

Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.

Read Methodology