Proactive Threat Prevention: A New Web3 Security Paradigm
Mar 17 2023

On 2023–03–17 05:48:59 (UTC), BlockSec successfully blocked an attack attempt on ParaSpace (a top NFT lending protocol) and protected crypto assets worth $5M.

As mentioned in the previous blog, we always believe a more proactive threat prevention solution can help to defend against the threats. We have deployed such a system internally in 2022. As of this writing, our system successfully blocked multiple attacks and saved around 14 million USD users’ assets.

See our perspective on proactive threat prevention in this article.

The feasibility and practice of our solution have been widely recognized by the community, and we have collaborated with some top-notch partners in the community. For example, we are working with Compound to develop a risk prevention system for Compound V3 smart contracts.

We always try to build blockchain security infrastructure for the Web3 community, including Phalcon Explorer (a transaction analysis tool for Web3 developers and security researchers), MetaDock (a security toolbox for Web3 users), and MetaSleuth (a fund tracing tool for Web3 users).

Phalcon Explorer
MetaDock
MetaSleuth

Learn more about BlockSec: Website | Document | Twitter | Medium | TG Group

Sign up for the latest updates
#10: ThirdWeb Incident: Incompatibility Between Trusted Modules Exposes Vulnerability
Security Insights

#10: ThirdWeb Incident: Incompatibility Between Trusted Modules Exposes Vulnerability

This blog shows the vulnerability and attack caused by Incompatibility of commonly used modules.

#9: MEV Bot 0xd61492: From Predator to Prey in an Ingenious Exploit
Security Insights

#9: MEV Bot 0xd61492: From Predator to Prey in an Ingenious Exploit

On August 3, 2023, an MEV Bot on Arbitrum was attacked, resulting in $800K in loss. The root cause of this attack was **Insufficient User Input Verification**.

#8: SushiSwap Incident: A Clumsy Rescue Attempt Leads to a Series of Copycat Attacks
Case Studies

#8: SushiSwap Incident: A Clumsy Rescue Attempt Leads to a Series of Copycat Attacks

On April 9, 2023, SushiSwap became the target of an exploit due to an Unverified External Parameter. The total loss is about $3.3 million.

BlockSec uses cookies and other identifiers to analyze our traffic in accordance. We also share information about your use of our site with our analytics partners. By remaining on this website, you consent to our use of cookies and the Privacy Policy.