Security
Intelligence.

Decentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.

Total Value Lost (2026)

$7.35M

trending_up YTD

Documented Incidents

690

VERIFIED

All-Time Losses Tracked

$3.44B

On-Chain

Featured Post-Mortems

Deep-dive structural analysis of landmark vulnerabilities.

View Archive arrow_forward

Latest Security Incidents

Real-time ledger of verified exploits and security anomalies.

Date Protocol Chain Amount Type
Mar 27, 2026 EST Token BNB Chain Undisclosed Business Logic Flaw
Mar 15, 2026 Venus THE BNB Chain Undisclosed Donation Attack
Mar 10, 2026 AlkemiEarn Undisclosed Business Logic Flaw
Mar 2, 2026 Curve LlamaLend Undisclosed Price Manipulation
Feb 22, 2026 LAXO Token Undisclosed Other
Feb 15, 2026 Moonwell $1.78M Oracle Manipulation

Security Education

Access our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.

Q: What are the two main limitations of traditional cross-chain solutions?

They rely heavily on centralized middleware or smart contracts and lack privacy considerations.

Q: What challenge does integrating I4.0 technologies into SHSCs aim to address?

Mitigating risks and uncertainties in humanitarian supply chains caused by climate change.

Security Analysis UI
verified_user

Verified Methodology

Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.

Read Methodology