background

Next-Generation Security for L1 & L2 Chains

Protect your infrastructure before launch. Block attacks at the source to shield your ecosystem and reputation.

PRE-LAUNCH
Fortify Your Foundation

Audit core infrastructure, including the VM, bridges, and consensus.

Verify the soundness of core components by using Differential Testing to ensure logical and behavioral precision.

Launch with confidence, following a top-tier EVM chain audit confirms architectural integrity.

POST-LAUNCH
Proactive Ecosystem Defense

Monitor all on-chain and mempool activities for threats.

Get instant alerts on attacks targeted dApps in your ecosystem.

Track illicit funds to maintain your chain's compliance posture.

ACTIVE THREAT
Block Attacks at the Source (For L2s)

Deploy STOP to block malicious transactions at the sequencer level.

Block large-scale hacks before attackers execute them on-chain.

Protect all ecosystem protocols and users with native, real-time defense.

POST-INCIDENT
Analyze and Fortify

Leverage Phalcon Explorer for deep forensic analysis for Root Cause Analysis (RCA) and MetaSleuth to trace malicious funds.

Receive detailed post-mortem reports that deconstruct the full attack vector.

Implement actionable insights to harden your chain against future incidents.

Protect Your Chain Infrastructure at the Core

Strengthen your EVM chain infrastructure with our in-depth core audits. For Layer 2 network, the STOP platform delivers preemptive, sequencer-level defense, actively identifying and blocking malicious transactions to protect your ecosystem's integrity.

phalcon security

Phalcon is an effective tool that helps project teams complete core monitoring in a very short period. Additionally, Phalcon is backed by a highly professional technical team that can provide timely support, solution discussions, development, and testing.

Sean
Sean
MANTLE Product Manager
Read Next
Newsletter - April 2026

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Trusted by the Best

For 500+ clients, from Web3 leaders to global regulators

Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth

Ready to Build an Unshakeable Ecosystem?