Security
Intelligence.

Decentralized forensic analysis of blockchain vulnerabilities. Monitor, analyze, and learn from 690 on-chain exploitation incidents.

Total Value Lost (2026)

$7.35M

trending_up YTD

Documented Incidents

690

VERIFIED

All-Time Losses Tracked

$3.44B

On-Chain

Featured Post-Mortems

Deep-dive structural analysis of landmark vulnerabilities.

View Archive arrow_forward

Latest Security Incidents

Real-time ledger of verified exploits and security anomalies.

Date Protocol Chain Amount Type
Mar 27, 2026 EST Token BNB Chain Undisclosed Business Logic Flaw
Mar 15, 2026 Venus THE BNB Chain Undisclosed Donation Attack
Mar 10, 2026 AlkemiEarn Undisclosed Business Logic Flaw
Mar 2, 2026 Curve LlamaLend Undisclosed Price Manipulation
Feb 22, 2026 LAXO Token Undisclosed Other
Feb 15, 2026 Moonwell $1.78M Oracle Manipulation

Security Education

Access our curated repository of vulnerability patterns derived from 690 historic smart-contract exploits.

Q: What is the primary objective of utilizing AutoML tools in time series forecasting?

To automate the process of building and optimizing ML models, making ML more accessible for users without extensive technical knowledge.

Q: How do signature aggregations work within the framework?

By combining multiple digital signatures into a single proof to streamline authentication.

Security Analysis UI
verified_user

Verified Methodology

Every incident in the archive is sourced from public post-mortems and reproducible Foundry proofs-of-concept.

Read Methodology