background

Next-Generation Security for L1 & L2 Chains

Protect your infrastructure before launch. Block attacks at the source to shield your ecosystem and reputation.

PRE-LAUNCH
Fortify Your Foundation

Audit core infrastructure, including the VM, bridges, and consensus.

Verify the soundness of core components by using Differential Testing to ensure logical and behavioral precision.

Launch with confidence, following a top-tier EVM chain audit confirms architectural integrity.

POST-LAUNCH
Proactive Ecosystem Defense

Monitor all on-chain and mempool activities for threats.

Get instant alerts on attacks targeted dApps in your ecosystem.

Track illicit funds to maintain your chain's compliance posture.

ACTIVE THREAT
Block Attacks at the Source (For L2s)

Deploy STOP to block malicious transactions at the sequencer level.

Block large-scale hacks before attackers execute them on-chain.

Protect all ecosystem protocols and users with native, real-time defense.

POST-INCIDENT
Analyze and Fortify

Leverage Phalcon Explorer for deep forensic analysis for Root Cause Analysis (RCA) and MetaSleuth to trace malicious funds.

Receive detailed post-mortem reports that deconstruct the full attack vector.

Implement actionable insights to harden your chain against future incidents.

Protect Your Chain Infrastructure at the Core

Strengthen your EVM chain infrastructure with our in-depth core audits. For Layer 2 network, the STOP platform delivers preemptive, sequencer-level defense, actively identifying and blocking malicious transactions to protect your ecosystem's integrity.

phalcon security

Phalcon is an effective tool that helps project teams complete core monitoring in a very short period. Additionally, Phalcon is backed by a highly professional technical team that can provide timely support, solution discussions, development, and testing.

Sean
Sean
MANTLE Product Manager
Read Next
Newsletter - April 2026

Newsletter - April 2026

In April 2026, the DeFi ecosystem experienced three major security incidents. KelpDAO lost ~$290M due to an insecure 1-of-1 DVN bridge configuration exploited via RPC infrastructure compromise, Drift Protocol suffered ~$285M from a multisig governance takeover leveraging Solana's durable nonce mechanism, and Rhea Finance incurred ~$18.4M following a business logic flaw in its margin-trading module that allowed circular swap path manipulatio

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

~$7.04M Lost: GiddyDefi, Volo Vault & More | BlockSec Weekly

This BlockSec weekly security report covers eight attack incidents detected between April 20 and April 26, 2026, across Ethereum, Avalanche, Sui, Base, HyperLiquid, and MegaETH, with total estimated losses of approximately $7.04M. The highlighted incident is the $1.3M GiddyDefi exploit, where the attacker did not break any cryptography or use a flash loan but simply replayed an existing on-chain EIP-712 signature with the unsigned `aggregator` and `fromToken` fields swapped out for a malicious contract, demonstrating how partial signature coverage turns any historical signature into a generic permit. Other incidents include a $3.5M Volo Vault operator key compromise on Sui, a $1.5M Purrlend privileged-role takeover, a $413K SingularityFinance oracle misconfiguration, a $142.7K Scallop cross-pool index injection, a $72.35K Kipseli Router decimal mismatch, a $50.7K REVLoans (Juicebox) accounting pollution, and a $64K Custom Rebalancer arbitrary-call exploit.

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Trusted by the Best

For 500+ clients, from Web3 leaders to global regulators

Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Uniswap Foundation
Compound Finance
Radiant
FBTC
Magpie
Telcoin
Bybit
EOS Network Foundation
1intro
Kava
EVMOS
ApeX
Tectonic
Burrow
Alpaca Finance
Meta Pool
Izumi
Mage Finance
bitget
yei finance
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth
Puffer
Pancakeswap
Mantle
Prisma
Polygon ZKEVM
Cobo
crypto.com
Polyhedra Network
Filecoin
NEAR Foundation
Stader
Amber
LiNEAR
Matrixport
VVS Finance
Aurora
Lista DAO
okx
megaeth

Ready to Build an Unshakeable Ecosystem?