Protect your exchange at every level: Vet new listings, monitor core assets, and ensure global compliance.
Screen all incoming and outgoing transactions against high-risk categories, including: terrorism financing, human trafficking, pig butchering, child abuse, and known hacker addresses.
Ensure compliance with FATF standards across the U.S., Europe, Hong Kong SAR, and 27+ global jurisdictions.
Vet projects for listing and investment by conducting rigorous code audits.
Protect your users and reputation by identifying vulnerabilities in advance.
Get real-time monitoring for all your Safe{wallet} multi-sig treasuries.
Detect suspicious transactions and get alerted before they are signed and executed.
Understand the methods behind any exploit that affect your listed assets without delay.
Gain actionable intelligence to strengthen security and inform your community.
Secure Exchange Operations and User Assets
“We are big fans of BlockSec and have been deeply involved from the inception of BlockSec to the use of each of its products. Phalcon is a very good security tool, to help Bybit achieve on-chain tracking and web3 contract security monitoring. We will have more cooperation with BlockSec in the future.”

Top 10 "Awesome" Security Incidents in 2025
To help the community learn from what happened, BlockSec selected ten incidents that stood out most this year. These cases were chosen not only for the scale of loss, but also for the distinct techniques involved, the unexpected twists in execution, and the new or underexplored attack surfaces they revealed.

#10 Panoptic Incident: XOR Linearity Breaks the Position Fingerprint Scheme
On August 29, 2025, Panoptic disclosed a Cantina bounty finding and confirmed that, with support from Cantina and Seal911, it executed a rescue operation on August 25 to secure roughly $400K in funds. The issue stemmed from a flaw in Panoptic’s position fingerprint calculation algorithm, which could have enabled incorrect position identification and downstream fund risk.

#9 1inch Incident: From Calldata Corruption to Forged Settlement: Binary Exploitation Goes On-Chain
On March 5, 2025, a third-party resolver integrated with 1inch Fusion V1 was exploited for over $5M after an unsafe calldata reconstruction in the settlement flow allowed attacker-controlled interaction lengths to trigger a pointer underflow and inject forged settlement data. The impact was amplified by a broken trust boundary, where resolver contracts treated forwarded calldata as authoritative based only on msg.sender, letting attacker-crafted payloads inherit settlement-level privileges while still passing access control.
For 500+ clients, from Web3 leaders to global regulators