Blog

Security insights and updates from the Exploitless team. Featuring original research and syndicated content from Medium.

Featured image for Econ Security Spotlight: Incentive Attacks and Economic Safeguards

Econ Security Spotlight: Incentive Attacks and Economic Safeguards

TL;DRWeb3 security has shifted beyond code bugs to economic vulnerabilities, as record 2025 losses showed that even flawless code can’t save a protocol with...

Read more →
Featured image for Bridges, Rollups, and Validators: Why Cross-Chain Integrity is the New Security Frontier
hr

Bridges, Rollups, and Validators: Why Cross-Chain Integrity is the New Security Frontier

TL;DRCross-chain security is no longer mainly about token wrapping or bridge UX. It is about whether a system can preserve message integrity as data, assets,...

Read more →
Featured image for Blockchain Forensics: Tracing Theft and Freezing Funds

Blockchain Forensics: Tracing Theft and Freezing Funds

TL;DR:Crypto theft on-chain: In 2025, over $3.4B in cryptocurrency was stolen. North Korea–linked hackers alone accounted for roughly 52–61% of that (≈$2.0B)....

Read more →
article

Attack Story 4: WazirX: When Multisig UX Becomes a Security Boundary

Attack Story 4: WazirX: When Multisig UX Becomes a Security Boundary

Read more →
Featured image for Security for the Lifecycle: Building Resilience from Seed to Institutional Mainnet
cybersecurity

Security for the Lifecycle: Building Resilience from Seed to Institutional Mainnet

TL;DRSecurity strategy should change as a protocol changes. What is acceptable at seed stage becomes dangerous at growth stage, and unacceptable at...

Read more →
Featured image for Inside a Smart Contract Audit: From Code Review to Resilience

Inside a Smart Contract Audit: From Code Review to Resilience

TL;DR:Audits are mission-critical. With billions at stake in DeFi, smart contract audits have gone from “nice-to-have” to must-have, top auditors command...

Read more →
article

Attack Story 3: Coincheck: When Custody Architecture Becomes the Exploit

Attack Story 3: Coincheck: When Custody Architecture Becomes the Exploit

Read more →
Featured image for Two Signals Your Protocol is Under Attack: Flow Anomaly and Threshold Breaches
cybersecurity

Two Signals Your Protocol is Under Attack: Flow Anomaly and Threshold Breaches

TL;DRFlow anomalies detect sub-second asset movements that deviate from a protocol’s historical operational “heartbeat”.Threshold breaches identify when...

Read more →
Featured image for Runtime Defense 101: Real-Time Monitoring in DeFi

Runtime Defense 101: Real-Time Monitoring in DeFi

TL;DR:Static audits alone are insufficient. In DeFi, continuous on-chain monitoring (“runtime defense”) is essential because new exploits can emerge at any...

Read more →
Featured image for The Integration Minefield: Why Your Protocol is Only as Secure as its Oracles
web3

The Integration Minefield: Why Your Protocol is Only as Secure as its Oracles

TL;DRIn the 2026 DeFi landscape, code security is a solved baseline; the primary threat surface has moved to integration risk and the fragile boundaries...

Read more →
Featured image for Securing Bridges and Oracles: The Hidden Threats of Cross-Chain

Securing Bridges and Oracles: The Hidden Threats of Cross-Chain

TL;DRBridges hold enormous value. Blockchains now interoperate via bridges that lock up millions or even billions of dollars in pooled assets. Predictably,...

Read more →
article

Attack Story 2: The Munchables Exploit: When “Rogue Dev Risk” Becomes a Protocol Incident.

Attack Story 2: The Munchables Exploit: When “Rogue Dev Risk” Becomes a Protocol Incident.

Read more →
Featured image for Active Defense: Designing Resilience Beyond the Norm
cybersecurity

Active Defense: Designing Resilience Beyond the Norm

TL;DROne-time code reviews reduce risk, but active defense assumes failures will still happen and designs for containment.Runtime resilience is built from...

Read more →
Featured image for Analyzing the Bybit Hack: Lessons in Supply Chain Security
web3

Analyzing the Bybit Hack: Lessons in Supply Chain Security

TL;DRIn February 2025, a supply-chain compromise of a third-party multisig service led to a $1.44B heist on Bybit.Attackers injected malicious code into the...

Read more →
article

Attack 1 story – Mt. Gox ($460M, 2014)

Attack 1 story – Mt. Gox ($460M, 2014)

Read more →
Featured image for Your First Steps With Smart Contract Auditing: What a Web3 Security Looks Like
web3

Your First Steps With Smart Contract Auditing: What a Web3 Security Looks Like

TL;DRA real audit starts before code review: scoping, threat modeling, and agreeing on what “safe” means for your protocol.The best outcome is not a PDF, it’s...

Read more →
Featured image for The Long Tail of Web3 Vulnerabilities: What Happens After the Headlines Fade
cybersecurity

The Long Tail of Web3 Vulnerabilities: What Happens After the Headlines Fade

TL;DRThe lifecycle of a Web3 security incident has evolved from a terminal event into a multiyear operational long tail involving legal restructuring,...

Read more →
Featured image for Tokenomics as Security: How Incentive Design Prevents (or Enables) Exploits
cybersecurity

Tokenomics as Security: How Incentive Design Prevents (or Enables) Exploits

TL;DR• Modern Web3 security has transitioned from finding simple code bugs to modeling economic threats, as record losses in 2025 proved that sound code cannot...

Read more →
Featured image for Access Control Checkup: A One-Hour Review That Catches Real Bug
web3

Access Control Checkup: A One-Hour Review That Catches Real Bug

TL;DR• Access control mistakes are still one of the most common root causes of serious Web3 hacks.• You can catch a surprising number of issues in an hour by...

Read more →
Featured image for The Psychology of Web3 Incidents: Panic, Silence, and How Teams Lose Trust
cybersecurity

The Psychology of Web3 Incidents: Panic, Silence, and How Teams Lose Trust

TL;DRThe exploit drains funds, but the reaction decides whether trust survives.Panic and silence are the two most common failure modes during Web3...

Read more →
Featured image for Audits in Depth: What a Serious Web3 Audit Actually Looks Like
web3

Audits in Depth: What a Serious Web3 Audit Actually Looks Like

TL;DRWeb3 is still losing billions to hacks; in 2025 the average loss per incident was about $5.3M, so an audit is risk management, not a checkbox.Real audits...

Read more →
Featured image for Security Budgeting for Lean Web3 Teams: What to Buy, What to Build
web3

Security Budgeting for Lean Web3 Teams: What to Buy, What to Build

TL;DR• Web3 hacks routinely cost billions per year; in 2022 alone, about 3.1–3.8B USD was stolen, with DeFi and bridges taking the majority of the hit.• A...

Read more →
Featured image for Bridges, Rollups, L2s: Why Cross-Chain Is Still Where Money Goes Missing
cybersecurity

Bridges, Rollups, L2s: Why Cross-Chain Is Still Where Money Goes Missing

TL;DRCross-chain bridges alone have been hacked for $2.5–2.8B+, accounting for roughly 40–70% of all value stolen in some recent years.Most losses trace back...

Read more →
Featured image for From Retail Trader to Protocol: Web3 Security at the Individual, Team, and Ecosystem Level
web3

From Retail Trader to Protocol: Web3 Security at the Individual, Team, and Ecosystem Level

TL;DR• Most losses still begin with simple failures: stolen keys, bad approvals, unmonitored admin power. • In 2024 alone, attackers stole about 2.2 billion...

Read more →
Featured image for Three On-Chain Signals That Something Is Going Wrong Right Now
cybersecurity

Three On-Chain Signals That Something Is Going Wrong Right Now

TL;DRMost big exploits leave a trail on-chain minutes before the worst damage: strange flow patterns, abnormal function calls and outsized transfers.You do not...

Read more →
article

How to Read Old Web3 Postmortems in 2026 and Still Learn Something Useful

How to Read Old Web3 Postmortems in 2026 and Still Learn Something Useful

Read more →
Featured image for Composability as an Attack Surface: How Integrations Break “Battle-Tested” Protocols
cybersecurity

Composability as an Attack Surface: How Integrations Break “Battle-Tested” Protocols

TL;DRDeFi “money legos” make integrations one of the biggest attack surfaces in Web3, not just a convenience layer.bZx, Mango Markets and Euler Finance all...

Read more →
article

Attack 2 – The Parity Multisig Bug (2017): When the Wallet Became the Weakest Link

Attack 2 – The Parity Multisig Bug (2017): When the Wallet Became the Weakest Link

Read more →
Featured image for Seven Eras of Web3 Hacks: From The DAO to Cross-Chain Chaos
cybersecurity

Seven Eras of Web3 Hacks: From The DAO to Cross-Chain Chaos

TL;DRWeb3 hacks have moved in eras: from contract logic bugs to bridge failures and CEX cold-wallet compromises.Each landmark exploit exposed a different wrong...

Read more →
article

The DAO Hack: The Prototype Web3 Failure

The DAO Hack: The Prototype Web3 Failure

Read more →
Featured image for Incident Response for Web3 Teams: The 30-Minute Playbook
web3

Incident Response for Web3 Teams: The 30-Minute Playbook

TL;DRIn 2024, crypto platforms lost about $2.2B to hacks across 303 incidents, which works out to almost one major incident every day.The first 5 minutes...

Read more →
article

The Top 10 Web3 Vulnerabilities That Keep Getting Teams Hacked

The Top 10 Web3 Vulnerabilities That Keep Getting Teams Hacked

Read more →
Featured image for From Audit to Runtime: Building a Security Program That Actually Survives Mainnet.
blockchain

From Audit to Runtime: Building a Security Program That Actually Survives Mainnet.

TL;DRIn 2024, Web3 lost between $1.5–2.5B+ across hundreds of incidents; audits alone clearly aren’t enough.Around 70% of major 2024 exploits hit audited...

Read more →
article

The Largest Web3 Hack Ever (Bybit): Anatomy, Numbers & What It Reveals

The Largest Web3 Hack Ever (Bybit): Anatomy, Numbers & What It Reveals

Read more →