Back to Blog

BlockSec 揭示新网站 | 全方位守护协议生命周期安全

March 18, 2024
4 min read

我们很高兴地宣布全新 BlockSec 官网 正式上线!

Figure 1: BlockSec 官网
Figure 1: BlockSec 官网

作为一家全栈区块链安全服务提供商,BlockSec 致力于超越传统安全服务的界限,为区块链项目提供全生命周期的安全保障。 从项目上线前的安全审计,到上线后的安全监控和攻击拦截,BlockSec 确保协议开发每个阶段的最高安全级别。

此次官网升级不仅是品牌形象的全面革新,更是 BlockSec 的一个重要里程碑。本文将详细介绍 BlockSec 提供的全栈安全服务和产品,以及它们如何满足项目在不同阶段的差异化需求。

确保协议的全生命周期安全

上线前:

  • 安全审计

上线后

  • 安全监控 + 攻击拦截:Phalcon

安全审计

🔗 https://blocksec.com/code-audit

Figure 2: 安全审计官网
Figure 2: 安全审计官网

BlockSec 提供智能合约和 EVM 链审计服务:

  • 全面的审计,涵盖技术、业务和财务层面。
  • 专业报告,为审计中发现的每个问题提供可操作的解决方案。
  • 卓越的审计质量带来高客户满意度,帮助客户赢得用户信任。

查看我们的审计报告:https://blocksec.com/audit-reportt

了解我们的前沿研究:https://blocksec.com/research

攻击监控与拦截平台:Phalcon

🔗 https://blocksec.com/phalcon

Figure 3: Phalcon 官网
Figure 3: Phalcon 官网

Phalcon 是 BlockSec 开发的用于监控和拦截黑客攻击的安全平台。该系统检测可疑交易,即时通知用户,并采取自动响应措施。

  • 早期精准的攻击监控:Phalcon 的检测引擎扫描所有内存池和链上交易,寻找恶意提案、合约以及其他潜在威胁。它利用 DeFi 语义和 AI 算法,实现最低的误报率。
  • 运营风险监控:除了监控恶意活动,系统还密切关注管理员密钥、角色授予和关键变量的变化。这使得能够及时检测私钥泄露、权限篡改等安全风险。
  • 定制化自动攻击拦截:当交易满足触发条件时,Phalcon 在一个区块时间内(支持多签钱包)启动自动操作。它提供标准的响应操作模板,用户也可以选择自定义操作。
  • 低代码配置:利用各种预设监控模板,轻松监控交易、函数、事件和变量。无需编写代码即可轻松设置监控规则和响应操作。
Figure 4: Phalcon 用例
Figure 4: Phalcon 用例

支持工具:Phalcon Explorer

Phalcon Explorer 是 Phalcon 平台的配套工具。这个强大的交易浏览器专为 DeFi 社区设计。它提供关于调用流、余额变化和交易资金流的全面数据,并支持交易模拟。这有助于开发者、安全研究人员和交易者更直观地理解交易。

更多 BlockSec 的构建者工具包

加密追踪与调查平台:MetaSleuth

🔗 https://metasleuth.io/

Figure 5: MetaSleuth 官网
Figure 5: MetaSleuth 官网

MetaSleuth 简化了每个人的调查过程,提供专业级工具以满足专家的需求。MetaSleuth 是一个全面的平台,使用户能够更深入地了解区块链活动。它提供了一系列专为加密调查设计的强大功能,例如资金追踪、资金流可视化、实时交易监控以及保存和共享分析结果的能力。凭借其智能能力和跨链分析,MetaSleuth 使追踪复杂 DeFi 交易中的资金变得前所未有的轻松和高效。

浏览器扩展:MetaSuites

🔗 https://blocksec.com/metasuites

Figure 6: MetaSuites 官网
Figure 6: MetaSuites 官网

MetaSuites 是一款浏览器扩展,可生成资金流、显示地址标签、一键下载数据、模拟交易、查看存储和代理升级,以及在十多个区块链浏览器上提供 20 多种实用功能。

我们热诚邀请您体验全新的 BlockSec 官网,并与我们一起构建一个更安全的 Web3 世界。

Sign up for the latest updates
The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis
Security Insights

The Decentralization Dilemma: Cascading Risk and Emergency Power in the KelpDAO Crisis

This BlockSec deep-dive analyzes the KelpDAO $290M rsETH cross-chain bridge exploit (April 18, 2026), attributed to the Lazarus Group, tracing a causal chain across three layers: how a single-point DVN dependency enabled the attack, how DeFi composability cascaded the damage through Aave V3 lending markets to freeze WETH liquidity exceeding $6.7B across Ethereum, Arbitrum, Base, Mantle, and Linea, and how the crisis forced decentralized governance to exercise centralized emergency powers. The article examines three parameters that shaped the cascade's severity (LTV, pool depth, and cross-chain deployment count) and provides an exclusive technical breakdown of Arbitrum Security Council's forced state transition, an atomic contract upgrade that moved 30,766 ETH without the holder's signature.

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 13 – Apr 19, 2026

This BlockSec weekly security report covers four attack incidents detected between April 13 and April 19, 2026, across multiple chains such as Ethereum, Unichain, Arbitrum, and NEAR, with total estimated losses of approximately $310M. The highlighted incident is the $290M KelpDAO rsETH bridge exploit, where an attacker poisoned the RPC infrastructure of the sole LayerZero DVN to fabricate a cross-chain message, triggering a cascading WETH freeze across five chains and an Arbitrum Security Council forced state transition that raises questions about the actual trust boundaries of decentralized systems. Other incidents include a $242K MMR proof forgery on Hyperbridge, a $1.5M signed integer abuse on Dango, and an $18.4M circular swap path exploit on Rhea Finance's Burrowland protocol.

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026
Security Insights

Weekly Web3 Security Incident Roundup | Apr 6 – Apr 12, 2026

This BlockSec weekly security report covers four DeFi attack incidents detected between April 6 and April 12, 2026, across Linea, BNB Chain, Arbitrum, Optimism, Avalanche, and Base, with total estimated losses of approximately $928.6K. Notable incidents include a $517K approval-related exploit where a user mistakenly approved a permissionless SquidMulticall contract enabling arbitrary external calls, a $193K business logic flaw in the HB token's reward-settlement logic that allowed direct AMM reserve manipulation, a $165.6K exploit in Denaria's perpetual DEX caused by a rounding asymmetry compounded with an unsafe cast, and a $53K access control issue in XBITVault caused by an initialization-dependent check that failed open. The report provides detailed vulnerability analysis and attack transaction breakdowns for each incident.