Blog

Notes from the field.

Discover insightful resources and expert advice from our seasoned team to elevate your knowledge.

⌘ Blockchains Experts

Smart Contract Audit Cost: A 2026 Pricing Guide

Florian Amette

Florian Amette

Smart Contract Audit Cost: A 2026 Pricing Guide

What a smart contract audit costs in 2026, by scope, by code complexity, by chain, and the tradeoffs...

⌘ Blockchains Experts

MiCA Pentest Requirements: A Compliance Guide for CASPs

Florian Amette

Florian Amette

MiCA Pentest Requirements: A Compliance Guide for CASPs

What MiCA, DORA Articles 24–27, and the local PSAN regime actually require in terms of penetration t...

⌘ Blockchains Experts

DORA TLPT: What Threat-Led Penetration Testing Actually Looks Like

Florian Amette

Florian Amette

DORA TLPT: What Threat-Led Penetration Testing Actually Looks Like

DORA Article 26 mandates threat-led penetration testing for significant financial entities, includin...

⌘ Blockchains Experts

Rug Pull Detection: A Guide to On-Chain Red Flags

Florian Amette

Florian Amette

Rug Pull Detection: A Guide to On-Chain Red Flags

How to spot a rug pull before it happens: owner-only mint functions, concentrated liquidity, malicio...

⌘ Blockchains Experts

Smart Contract Audit Checklist for DeFi Protocols

Florian Amette

Florian Amette

Smart Contract Audit Checklist for DeFi Protocols

What a credible DeFi audit actually covers, manual review, invariant testing, threat modeling, and t...

⌘ Blockchains Experts

How Approval Phishing Drains Wallets, and How to Stop It

Florian Amette

Florian Amette

How Approval Phishing Drains Wallets, and How to Stop It

Approval phishing is the dominant wallet-drain pattern on EVM chains. Here is how it works, why it w...

⌘ Blockchains Experts

Multi-Sig vs MPC: Choosing a Treasury Wallet Architecture

Florian Amette

Florian Amette

Multi-Sig vs MPC: Choosing a Treasury Wallet Architecture

Multi-sig and MPC are not interchangeable. Here is how each fails in practice, what each is good for...

⌘ Blockchains Experts

The Anatomy of a DeFi Oracle Manipulation Attack

Florian Amette

Florian Amette

The Anatomy of a DeFi Oracle Manipulation Attack

Oracle manipulation is the most successful attack pattern in DeFi history. Here is how it works, why...

⌘ Blockchains Experts

NFT Mint Security: 12 Things to Check Before Launch

Florian Amette

Florian Amette

NFT Mint Security: 12 Things to Check Before Launch

A pre-launch security checklist for NFT mints, contract bugs, mod-account hardening, deployer hygien...

⌘ Blockchains Experts

Incident Response for DeFi: The First Hour

Florian Amette

Florian Amette

Incident Response for DeFi: The First Hour

When a contract is exploited or a wallet is drained, the first hour decides what the next year looks...

⌘ Blockchains Experts

Bridge Security: Why Cross-Chain Bridges Get Exploited

Florian Amette

Florian Amette

Bridge Security: Why Cross-Chain Bridges Get Exploited

Bridges are the most exploited category of DeFi protocol. Here is why the architecture is hard, how ...

⌘ Blockchains Experts

DAO Treasury Security: A Practical Playbook

Florian Amette

Florian Amette

DAO Treasury Security: A Practical Playbook

DAO treasuries combine hedge-fund balance sheets with Discord-server operations. Here is the playboo...

⌘ Blockchains Experts

How to Read a Smart Contract Audit Report

Florian Amette

Florian Amette

How to Read a Smart Contract Audit Report

Audit reports look reassuring at first glance. The signal lives in the parts most readers skip: the ...

⌘ Blockchains Experts

MEV and Sandwich Attacks: What Your Users Lose on Every Trade

Florian Amette

Florian Amette

MEV and Sandwich Attacks: What Your Users Lose on Every Trade

MEV is not a single phenomenon. Some of it is structurally necessary; a large share is a regressive ...

⌘ Blockchains Experts

Crypto Exchange Security: From MiCA Readiness to Hot-Wallet Hardening

Florian Amette

Florian Amette

Crypto Exchange Security: From MiCA Readiness to Hot-Wallet Hardening

What MiCA and modern threat actors expect from a crypto exchange's security posture, custody archite...

⌘ Blockchains Experts

Web3 Game Security: When Your Players Are Your Threat Model

Florian Amette

Florian Amette

Web3 Game Security: When Your Players Are Your Threat Model

Web3 games combine fintech, smart-contract, and game security in one threat model. Here is how to bu...

⌘ Blockchains Experts

Broker Defense Partnership

Florian Amette

Florian Amette

Broker Defense Partnership

Announcing our partnership with Broker Defense, a firm specialised in helping crypto victims of frau...

Have a project that needs a second pair of eyes? Talk to us.