Back to Blog

BlockSec Partners with IOC and AЯMRD to Enhance Web 3.0 Security

Code Auditing
January 17, 2024

Introduction:

In the rapidly evolving landscape of blockchain technology, security remains a paramount concern. As the adoption of Web 3.0 continues to grow, the need for robust security measures becomes more pressing. To address this, BlockSec who conduct cutting-edge research, provide reliable security services and build insightful tools, has formally agreed to partner with Intelligence On Chain's (IOC) brand new suite of services called 'AЯMRD.'

IOC have positioned AЯMRD to become the Ultimate Web 3.0 Help desk, by offering a whole suite of services to new and existing crypto projects, that provide end to end security.

The collaboration between BlockSec, IOC, and AЯMRD marks a significant stride towards fortifying the foundations of decentralised applications. By leveraging cutting-edge tools and high-quality auditing services, the partnership is poised to set new standards for security in the blockchain space, ensuring a safer and more secure future for Web 3.0.

The Partnership:

BlockSec, has entered into a strategic partnership with IOC and AЯMRD to provide advanced auditing services and leverage their innovative tools for enhanced security, within the AЯMRD ecosystem. This collaboration aims to make the Web 3.0 space safer by proactively preventing attacks during both the design and live phases of smart contracts.

Utilising BlockSec's Smart Contract Auditing Services:

BlockSec's smart contract auditing services play a pivotal role in securing smart contracts. By thoroughly reviewing the codebase and identifying vulnerabilities, BlockSec ensures that smart contracts are resistant to potential exploits. This proactive approach is essential in preventing security breaches that could compromise the integrity of decentralised applications (DApps).

Phalcon: A Cutting-Edge Security Solution:

As part of this collaboration, BlockSec will deploy BlockSec Phalcon as a part of AЯMRD, the Web 3.0 Helpdesk allowing IOC to offer attack detecting and automated defense for protocols as a part of its package. Phalcon employs state-of-the-art techniques to identify and mitigate potential threats as they occur and prior to the attacked being confirmed on the blockchain, significantly reducing the impact of vulnerabilities in their smart contracts. Phalcon will be combined with many more offerings (within AЯMRD) and available through a subscription model.

IOC commits to using MetaSleuth exclusively:

In an effort to provide all-round comprehensive security package, IOC has agreed to exclusively utilise MetaSleuth as its Ethereum Virtual Machine (EVM) visualisation tool, which has unique advantages in cross-chain analysis, intelligently displaying key pathways, and matching flashswap transactions. In the event that a client is exposed to a hack or exploit, IOC will pursue the attackers using MetaSleuth, a long time preferred tool.

Making Web 3.0 Safer:

The combined efforts of BlockSec, IOC, and AЯMRD represent a significant step forward in making Web 3.0 safer for users and developers alike. By incorporating smart contract auditing services, advanced security tools like Phalcon, and real-time visualisation with MetaSleuth, the partnership aims to create a resilient blockchain ecosystem that withstands potential attacks.

Sign up for the latest updates
Newsletter - April 2026
Security Insights

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly
Security Insights

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit