Blog
-
Soroban Source Code Audit - Tricorn Bridge
Coinspect conducted comprehensive security reviews of projects built on Soroban, Stellar's new smart contracts platform. Key findings from our audit of the Tricorn Bridge include the identification and resolution of critical vulnerabilities, contributing valuable insights to the Soroban security community. -
You are at risk. The Truth About Web3 Wallets
Web3 wallet security research: Identifying vulnerabilities and proposing standardized benchmarks -
Tari Security Audit
Tari blockchain and wallet audit: Comprehensive review revealing multiple security issues -
A UI Flaw in Top Crypto Wallets We Need to Address
EIP-712 text injection vulnerability affecting multiple crypto wallets: Analysis and implications -
OpenZeppelin Governor Denial of Service
Vulnerability analysis in OpenZeppelin's Governor contract -
Arbitrum's Seatbelt fastening after Tornado Cash attack
Analyzing Arbitrum's governance vulnerability and mitigation strategies -
Unveiling Transaction Simulation Challenges: Blowfish Case Study
Phantom wallet vulnerability: Exploiting transaction simulation in Solana -
Software wallets research series: EIP-712 implementation issue impacting 40+ vendors
EIP-712 chainId validation issues in software wallets: Our research findings -
Exactly Protocol Audits
Exactly Protocol security audits: Findings from our year-long smart contract review -
Algorand Rekeying Attacks
Analyzing Algorand's transaction validation and potential account control vulnerabilities -
Zendoo Source Code Audit
Horizen's Zendoo sidechain: Source code review and security analysis -
Tempus Audit
Tempus DeFi protocol: Security review of smart contract implementation -
Incognito Audit
Security review of Incognito-Ethereum bridge smart contracts: Key findings -
Aragon Audit
Review of Aragon smart contracts: Key findings from our security audit -
Liquity Audit
Liquity DeFi system: Findings from our smart contract security audit -
Vesper Pools Audit
Vesper Pool's smart contracts under review: Our real-time security audit during development phase. -
Grin Security Audit
Grin's MimbleWimble implementation: Critical vulnerability found and fixed. Our security audit reveals all. -
Zcash Overwinter Audit Results
Zcash Overwinter upgrade: Security audit focusing on consensus and incentives -
Lesfex Exchange Penetration Test Results
Lesfex Cryptocurrency Exchange: Results of our week-long penetration test -
Zcash Security Audit Results
Zcash launch imminent: Our security audit of this groundbreaking Zerocash protocol implementation. -
Building a block-chain database the right way
Best practices for building blockchain databases based on bitcoind -
Capture the Coins Challenge 1: SIGHASH_SINGLE
Copay wallet vulnerability: Implications of our test transactions on Bitcoin security -
Copay wallet emptying vulnerability
Security analysis of Copay's multi-signature Bitcoin wallet implementation
-
You are at risk. The Truth About Web3 Wallets
Web3 wallet security research: Identifying vulnerabilities and proposing standardized benchmarks -
Tari Security Audit
Tari blockchain and wallet audit: Comprehensive review revealing multiple security issues -
A UI Flaw in Top Crypto Wallets We Need to Address
EIP-712 text injection vulnerability affecting multiple crypto wallets: Analysis and implications -
OpenZeppelin Governor Denial of Service
Vulnerability analysis in OpenZeppelin's Governor contract -
Arbitrum's Seatbelt fastening after Tornado Cash attack
Analyzing Arbitrum's governance vulnerability and mitigation strategies -
Unveiling Transaction Simulation Challenges: Blowfish Case Study
Phantom wallet vulnerability: Exploiting transaction simulation in Solana -
Software wallets research series: EIP-712 implementation issue impacting 40+ vendors
EIP-712 chainId validation issues in software wallets: Our research findings -
Exactly Protocol Audits
Exactly Protocol security audits: Findings from our year-long smart contract review -
Algorand Rekeying Attacks
Analyzing Algorand's transaction validation and potential account control vulnerabilities -
Zendoo Source Code Audit
Horizen's Zendoo sidechain: Source code review and security analysis -
Tempus Audit
Tempus DeFi protocol: Security review of smart contract implementation -
Incognito Audit
Security review of Incognito-Ethereum bridge smart contracts: Key findings -
Aragon Audit
Review of Aragon smart contracts: Key findings from our security audit -
Liquity Audit
Liquity DeFi system: Findings from our smart contract security audit -
Vesper Pools Audit
Vesper Pool's smart contracts under review: Our real-time security audit during development phase. -
Grin Security Audit
Grin's MimbleWimble implementation: Critical vulnerability found and fixed. Our security audit reveals all. -
Zcash Overwinter Audit Results
Zcash Overwinter upgrade: Security audit focusing on consensus and incentives -
Lesfex Exchange Penetration Test Results
Lesfex Cryptocurrency Exchange: Results of our week-long penetration test -
Zcash Security Audit Results
Zcash launch imminent: Our security audit of this groundbreaking Zerocash protocol implementation. -
Building a block-chain database the right way
Best practices for building blockchain databases based on bitcoind -
Capture the Coins Challenge 1: SIGHASH_SINGLE
Copay wallet vulnerability: Implications of our test transactions on Bitcoin security -
Copay wallet emptying vulnerability
Security analysis of Copay's multi-signature Bitcoin wallet implementation