Back to Blog

BlockSec 与 IOC 和 AЯMRD 合作,加强 Web 3.0 安全

Code Auditing
January 17, 2024

引言:

在快速发展的区块链技术领域,安全始终是至关重要的考量。随着 Web 3.0 的普及度不断提高,对强大安全措施的需求也日益紧迫。为了解决这个问题,BlockSec(一家从事前沿研究、提供可靠安全服务和构建有见地的工具的公司)已正式同意与 Intelligence On Chain(IOC)旗下的全新服务套件“AЯMRD”建立合作伙伴关系。

IOC 将 AЯMRD 定位为终极 Web 3.0 服务台,通过为新老加密项目提供一套端到端安全服务。

BlockSec、IOC 和 AЯMRD 之间的合作标志着在加强去中心化应用程序基础方面迈出了重要一步。通过利用最先进的工具和高质量的审计服务,此次合作有望为区块链领域设定新的安全标准,确保 Web 3.0 的未来更加安全可靠。

合作:

BlockSec 已与 IOC 和 AЯMRD 建立战略合作伙伴关系,旨在为 AЯMRD 生态系统内提供先进的审计服务,并利用其创新工具来增强安全性。此次合作旨在通过主动预防智能合约设计和上线阶段的攻击,使 Web 3.0 领域更加安全。

利用 BlockSec 的智能合约审计服务:

BlockSec 的智能合约审计服务在保护智能合约方面发挥着关键作用。通过彻底审查代码库并识别漏洞,BlockSec 确保智能合约能够抵御潜在的攻击。这种主动方法对于防止可能损害去中心化应用程序(DApps)完整性的安全漏洞至关重要。

Phalcon:一款尖端安全解决方案:

作为此次合作的一部分,BlockSec 将部署 BlockSec Phalcon 作为 AЯMRD(Web 3.0 服务台)的一部分,使 IOC 能够提供针对协议的攻击检测和自动化防御,作为其套餐的一部分。Phalcon 采用最先进的技术来识别和减轻潜在威胁的发生以及在攻击在区块链上确认之前,从而显著降低其智能合约中漏洞的影响。Phalcon 将与其他更多产品(在 AЯMRD 内)结合,并通过订阅模式提供。

IOC 承诺独家使用 MetaSleuth:

为了提供全方位、全面的安全套餐,IOC 已同意独家使用 MetaSleuth 作为其以太坊虚拟机(EVM)可视化工具,该工具在跨链分析、智能显示关键路径和匹配闪电贷交易方面具有独特的优势。如果客户遭受黑客攻击或漏洞利用,IOC 将使用 MetaSleuth(一个长期以来一直偏爱的工具)来追捕攻击者。

让 Web 3.0 更安全:

BlockSec、IOC 和 AЯMRD 的共同努力标志着在让 Web 3.0 对用户和开发人员都更加安全方面迈出了重要一步。通过整合智能合约审计服务、Phalcon 等高级安全工具以及 MetaSleuth 的实时可视化,此次合作旨在创建一个能够抵御潜在攻击的弹性区块链生态系统。

Sign up for the latest updates
Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Newsletter -  March 2026
Security Insights

Newsletter - March 2026

In March 2026, the DeFi ecosystem experienced three major security incidents. Resolv Protocol lost ~$80M due to compromised privileged infrastructure keys, BitcoinReserveOffering suffered ~$2.7M from a double-minting logic flaw, and Venus Protocol incurred ~$2.15M following a donation attack combined with market manipulation.

Best Security Auditor for Web3

Validate design, code, and business logic before launch. Aligned with the highest industry security standards.

BlockSec Audit