Back to Blog

新网站上线 | BlockSec 为协议生命周期安全保驾护航

March 18, 2024

我们很高兴地宣布全新BlockSec官网正式上线!

Figure 1: BlockSec's new website
Figure 1: BlockSec's new website

作为一家全栈区块链安全服务提供商,BlockSec致力于突破传统安全服务的界限,为区块链项目提供全面的生命周期安全保障。 从项目启动前的安全审计,到上线后的安全监控和攻击阻断,BlockSec确保协议开发各个阶段都能获得最 robust 的安全防护。

此次网站升级不仅是品牌形象的全面革新,更是BlockSec发展历程中的一个重要里程碑。本文将详细介绍BlockSec提供的全栈安全服务和产品,以及它们如何满足不同阶段项目差异化的需求。

确保协议全生命周期的安全

启动前:

  • 安全审计

上线后

  • 安全监控 + 攻击阻断:Phalcon

安全审计

🔗 https://blocksec.com/code-audit

Figure 2: The official website of Security Auditing
Figure 2: The official website of Security Auditing

BlockSec 提供智能合约和EVM链审计服务:

  • 全面覆盖技术、业务和金融方面的深度审计。

  • 专业报告,针对我们审计中发现的每一个问题提供可行的解决方案。

  • superior 的审计质量驱动高客户满意度,帮助客户赢得用户信任。

查看我们的审计报告:https://blocksec.com/audit-reportt

了解我们的前沿研究:https://blocksec.com/research

攻击监控与阻断平台:Phalcon

🔗 https://blocksec.com/phalcon

Figure 3: The official website of Phalcon
Figure 3: The official website of Phalcon

Phalcon 是BlockSec开发的一个用于监控和阻断黑客攻击的安全平台。该系统检测可疑交易,即时通知用户,并采取自动化行动进行响应。

  • 早期且精准的攻击监控:Phalcon的检测引擎扫描每个mempool和链上交易,以发现恶意提案、合约等潜在威胁。它利用DeFi语义和AI算法,实现极低的误报率。
  • 运营风险监控:该系统不仅监控恶意活动,还关注管理员密钥、角色授权和关键变量的变更。这使得能够及时检测到私钥泄露、权限篡改等安全风险。
  • 定制化行动的自动化攻击阻断:当交易满足触发条件时,Phalcon在区块时间内(支持多签钱包)启动自动化行动。它提供标准的响应行动模板,用户也可选择自定义行动。
  • 低代码配置:利用多种预设监控模板,轻松监控交易、函数、事件和变量。无需编码即可轻松设置监控规则和响应行动。
Figure 4: Use cases of Phalcon
Figure 4: Use cases of Phalcon

支持工具:Phalcon Explorer

Phalcon Explorer是Phalcon平台的支持工具。这款强大的交易浏览器专为DeFi社区设计。它提供关于调用流程、余额变更和交易资金流动的全面数据,并支持交易模拟。这有助于开发者、安全研究人员和交易者更直观地理解交易。

更多BlockSec的构建者工具集

加密货币追踪与调查平台:MetaSleuth

🔗 https://metasleuth.io/

Figure 5: The official website of MetaSleuth
Figure 5: The official website of MetaSleuth

MetaSleuth为每个人简化了调查流程,提供满足专家需求的专业级工具。MetaSleuth是一个全面的平台,使用户能够更深入地理解区块链活动。它提供了专为加密货币调查设计的多种功能,如资金追踪、资金流动可视化、实时交易监控以及保存和共享分析结果的能力。凭借其智能能力和跨链分析,MetaSleuth简化了在复杂DeFi交易中追踪资金的过程,使其比以往任何时候都更易于访问和高效。

浏览器扩展:MetaSuites

🔗 https://blocksec.com/metasuites

Figure 6: The official website of MetaSuites
Figure 6: The official website of MetaSuites

MetaSuites是一个浏览器扩展,可生成资金流动图、显示地址标签、一键下载数据、模拟交易、查看存储和代理升级,以及在十多个区块链浏览器上提供20多项实用功能。

我们热忱邀请您体验全新的BlockSec官网,并与我们一起构建一个更安全的Web3世界。

Sign up for the latest updates
Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation
Security Insights

Drift Protocol Incident: Multisig Governance Compromise via Durable Nonce Exploitation

On April 1, 2026 (UTC), Drift Protocol on Solana suffered a $285.3M loss after an attacker exploited Solana's durable nonce mechanism to delay the execution of phished multisig approvals, ultimately transferring administrative control of the protocol's 2-of-5 Squads governance with zero timelock. With full admin privileges, the attacker created a malicious collateral market (CVT), inflated its oracle price, relaxed withdrawal protections, and drained USDC, JLP, SOL, cbBTC, and other assets through 31 rapid withdrawals in approximately 12 minutes. This incident highlights how durable nonce-based delayed execution can decouple signer intent from on-chain execution, bypassing the temporal assumptions that multisig security implicitly relies on.

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Mar 23 – Mar 29, 2026

This BlockSec weekly security report covers eight DeFi attack incidents detected between March 23 and March 29, 2026, across Ethereum and BNB Chain, with total estimated losses of approximately $1.53M. Incidents include a $679K flawed burn mechanism exploit on the BCE token, a $512K spot-price manipulation attack on Cyrus Finance's PancakeSwap V3 liquidity withdrawal, a $133.5K flash-loan-driven referral reward manipulation on a TUR staking contract, and multiple integer overflow, reentrancy, and accounting error vulnerabilities in DeFi protocols. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.

Newsletter -  March 2026
Security Insights

Newsletter - March 2026

In March 2026, the DeFi ecosystem experienced three major security incidents. Resolv Protocol lost ~$80M due to compromised privileged infrastructure keys, BitcoinReserveOffering suffered ~$2.7M from a double-minting logic flaw, and Venus Protocol incurred ~$2.15M following a donation attack combined with market manipulation.