Open in app

Sign In

Write

Sign In

Coinspect Security
Coinspect Security

46 Followers

Home

About

Mar 18

Addressing Rumors and Recommendations Following the MyAlgo Wallet Hack

A high-impact hack recently targeted MyAlgo, a web-based Algorand wallet, affecting thousands of users. Our team at Coinspect has voluntarily collaborated with the wallet provider in a good-faith effort to identify the root cause. We are proud to say we identified one particular attack that matches the incidents reported. …

Algorand

3 min read

Addressing Rumors and Recommendations Following the MyAlgo Wallet Hack
Addressing Rumors and Recommendations Following the MyAlgo Wallet Hack
Algorand

3 min read


Feb 14

Dissecting Ethereum delegated staking from a security perspective — Part 2

Welcome to our second article on Security Considerations for Ethereum Delegated Proof of Stake (DPoS) platforms. As we explored previously, there are multiple security challenges associated with delegated staking, nearly all related to the excessive trust expected by staking platforms. In this post, we’ll delve into what led us to…

Ethereum

5 min read

Dissecting Ethereum delegated staking from a security perspective — Part 2
Dissecting Ethereum delegated staking from a security perspective — Part 2
Ethereum

5 min read


Dec 12, 2022

Learn EVM Attacks release

We at Coinspect are excited to announce the release of our new code repository, learn-evm-attacks! This repository is an educational resource for anyone who wants to learn more about Ethereum Virtual Machine (EVM) exploits and vulnerabilities. We have reproduced more than 30 attacks on EVM chains: most of them actually…

Security

1 min read

Learn EVM Attacks release
Learn EVM Attacks release
Security

1 min read


Dec 9, 2022

Dissecting Ethereum delegated staking from a security perspective — Part 1

As the number of platforms offering delegated Ethereum validators as a service grows, so does the interest in evaluating its associated risks. This post aims to help users interested in these services, as well as professionals reviewing or building such platforms. We will discuss the risk associated with: The high-trust…

Ethereum

6 min read

Dissecting Ethereum delegated staking from a security perspective — Part 1
Dissecting Ethereum delegated staking from a security perspective — Part 1
Ethereum

6 min read


Oct 13, 2021

Tempus Smart Contract Audit

In September 2021, Tempus engaged Coinspect to perform a third-party source code review of the smart contracts that comprise ther on-chain derivatives marketplace. No high-risk vulnerabilities that would result in stolen users funds were identified. However, one medium-risk issue (high impact, but low likelihood) was reported that could impact user funds if current security assumptions change in the future. Another medium-risk issue was reported related to the power the pool owners possess to update fees without constraints and that could be abused to harm users if the account were compromised.

Security Services

1 min read

Tempus Smart Contract Audit
Tempus Smart Contract Audit
Security Services

1 min read


Apr 30, 2021

Incognito Ethereum Bridge Audit

In February 2021, Incognito engaged Coinspect to perform a source code review of the smart contracts that comprise the Incognito-Ethereum bridge. The main contracts are: IncognitoProxy: stores beacon and bridge committee members of the Incognito Chain, and other contracts can query this contract to check if an instruction is confirmed on the Incognito Chain. Vault: responsible for deposits and withdrawals; it holds assets (Ether or ERC20 tokens) and emits events that the Incognito Chain interprets as minting instructions; and when presented with a burn proof created over at the Incognito Chain, it releases the assets back to the user.

Smart Contracts

1 min read

Incognito Ethereum Bridge Audit
Incognito Ethereum Bridge Audit
Smart Contracts

1 min read


Mar 30, 2021

Liquity Smart Contract Audit

In March 2021, Liquity engaged Coinspect to perform its second third-party source code review of the smart contracts that comprise the Liquity Protocol. Coinspect identified a high risk issue, a missing requirement in a function that allowed attackers to force the system to enter Recovery Mode in order to liquidate…

Defi

1 min read

Liquity Smart Contract Audit
Liquity Smart Contract Audit
Defi

1 min read


Mar 11, 2021

Aragon Smart Contract Audits

In August 2020, Aragon engaged Coinspect to perform a series of third-party source code reviews of the smart contracts that comprise their Protocol. Following are descriptions of the scope for several of those reviews: Aragon Protocol is a dispute resolution protocol. It handles subjective disputes that cannot be solved purely…

Smart Contract Audit

2 min read

Aragon Smart Contract Audits
Aragon Smart Contract Audits
Smart Contract Audit

2 min read


Feb 22, 2021

Horizen Source Code Audit

Executive Summary In February 2020, Horizen engaged Coinspect to audit the security of its blockchain platform. In particular this first engagement focused on reviewing Horizen platform additions to the Zcash protocol implementation including its core consensus rules, network protocols and privacy features. …

Horizen

4 min read

Horizen Source Code Audit
Horizen Source Code Audit
Horizen

4 min read


Feb 18, 2021

Vesper Pools Smart Contract Audits

Starting in September 2020, Bloq requested Coinspect to review selected parts of Vesper Pool’s source code while the contracts were being developed. Coinspect auditors spent 5 weeks during a period of 5 months. Coinspect published 5 smart contract audit reports detailing the tasks performed. Each report focused on an individual…

Vesper

1 min read

Vesper Pools Smart Contract Audits
Vesper Pools Smart Contract Audits
Vesper

1 min read

Coinspect Security

Coinspect Security

46 Followers

Security for a Decentralized World

Following
  • Vesper Finance

    Vesper Finance

  • Paradigm

    Paradigm

  • Patrick O'Grady

    Patrick O'Grady

  • Avalanche

    Avalanche

  • BlockSec

    BlockSec

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech