October 11, 2024

Certik. Бесплатный дроп за 1,5 часа?

Certik - это компания, занимающаяся безопасностью блокчейна

Инвестиции: $141m от Binance Labs, Sequoia Capital, Coinbase Ventures и др

Twitter Score: 144 из 1000. На уровне Scroll

Вложения: 0$
Время выполнения: 1,5 часа

С чего начать?

- Переходим на сайт skynet.certik.com и регистрируемся

- Сверху справа заходим в профиль и привязываем свой кошелек

- В левом меню заходим во вкладку Quest и выполняем задания

- Собираем все задания, зарабатываем гемы, делаем daily задания

Список ответов на все 150 квестов: SKYNET RATING:

◾️ Welcome to Skynet Quest -

◾️ Web3 Security with Skynet - 22

◾️ CertiK Ventures - 31

◾️ Code Security - 21

◾️ Operational Security - 13

◾️ Governance and Security in DAOs - 21

◾️ Market-Related Risks - 21

◾️ Community and Security Risks in Web3 - 22

◾️ Introduction to User Security - 12

◾️ Team and Insider Risks - 12

◾️ Security Score Impacts with OKX - 12

◾️ Proof of Work versus Proof of Stake - 142

◾️ Skynet Pulse - Real-Time Ins. by Sec - 23

◾️ Insights on Market Analytics - 3/123/1

◾️ Apple Recognizes CertiK - 323

◾️ Solidus AI Tech | High-Perf. - 123/2/2/3

◾️ Evaluating Security with Skynet Tok - 242

◾️ Stay Ahead with Skynet's Smart Cal. - 12

◾️ Empow. Y. Web3 Journ. Adv. Sec. - 322

◾️ Prior. Wallet Sec. with Sky. W. Scan. - 22

◾️ KYC Leaderboard Showcase - 22

◾️ Operational Security via Website Scan - 134/1/2

◾️ GitHub Monitoring for Better Code Security - 422

◾️ Governance Activity Monitoring - 123

◾️ Insights on Token Holder Analysis - 241

◾️ Security Rating for Pre-Launch Projects - 434

◾️ RWA Security and Leaderboard - 22

◾️ CertiK Ventures Announcement in Singapore - 4/12/4

◾️ How the DHS is Stopping Ransomware Attacks - 123

WEB3 SECURITY:

◾️ Introduction to Wallet Security - 11

◾️ Best Practices for Wallet Security - 43

◾️ Choosing a Secure Exchange - 41

◾️ Intro to Crypto Drainers - 41

◾️ Proof of Reserve - 24

◾️ Recognizing Risk Signals on the Exch. - 13

◾️ Introduction to User Security - 12

◾️ Protecting Yours. from Disc. Scams - 23

◾️ Website & dApp Security - 21

◾️ Private Key Security - 24

◾️ Private Key Security: Seed Phrases - 13

◾️ Evaluating Cryptocurr. News Sources - 1/1234

◾️ Protecting Your SQL Data... - 222

◾️ DEXTools | Real-Time Trading Ins. - 232

◾️ Important Exchange Security Features - 31

◾️ Understanding the Peel Chain Technique - 23

◾️ Losses Related to Private Key Compromises - 13

◾️ Stay Vigilant on Browser Plugins - 3/123

◾️ Understanding and Preventing Sybil Attacks - 141

◾️ How to Create and Maintain Secure Passwords - 222

◾️ What Is a Keylogger? - 12

◾️ Identifying Malicious Activity on Websites & dApps - 12

◾️ Exploring Etherscan - 221

◾️ Protecting Against Social Engineering Attacks - 223

◾️ Navigating NFT Security and Avoiding Scams - 223

◾️ Intro to AML and its Role in Crypto - 321

◾️ Secure Use of Exchanges - 231

◾️ Case Study on Enhancing Security for App Chains - 22

◾️ SOC 2 Compliance for Crypto Companies - 212

◾️ Understanding and Mitigating 51% Attacks - 222

◾️ Setting Up a Security War Room - 223

◾️ SIM Swap Attacks - 13/3

◾️ Common Web3 Phishing Methods - 12

◾️ Understanding Economic Exploits and Tokenomics - 221

◾️ Understanding Soft Rug vs. Hard Rug Pulls - 22

◾️ Hackers Infiltrating Crypto Job Boards - 332

◾️ Intro to Airdrop Scams - 2/123

◾️ Importance of Bug Bounty Programs in Web3 - 12

◾️ About Satoshi Nakamoto - 233

◾️ What is DePIN? - 23

◾️ Radiant Capital’s $50M DeFi Hack Response - 233

◾️ Defending Against Clipper Malware - 233

◾️ Exploring the Security Model for Optimism’s Superchain - 222

◾️ Case Study on the Risks of Phishing Attacks in DeFi - 313

SECURITY ANALYSIS

◾️ Analyzing Security Solana-Based Memecoins with CertiK’s Token Scan - Part 1 - 212

◾️ Analyzing Security Solana-Based Memecoins CertiK’s Token Scan - Part 2 - 222

CERTIK BLOG:

◾️ SkyInsights: Crypto Compliance - 32/124

◾️ SkyKnight - 232

◾️ Top Perf. Cryptocurr. of H1 2024 - 24

◾️ CertiK's Jour. to Sams. Sec. Hall... - 222

◾️ Navig. DAO Gov. and the Comp... - 232

◾️ Underst. the Android SpyAgent... - 22

◾️ Unveiling the KYC Actor Industry - 124

◾️ Top Compliance Risks in Crypto - 221

◾️ Underst. the Imp. of FIT21 on Cryp. Comp. - 1/2/1234

◾️ Cold Wallets - 2/124/14

◾️ Trap Phishing on Trusted Platforms - 21

◾️ Different Mechanisms for Honeypot Scams - 12

◾️ Introduction to Formal Verification - 11

◾️ Ordinals and the BRC-20 Standard - 21

◾️ How Exit Scammers Mint Tokens Undetected - 21

◾️ Introduction of Diamond Agency Contract - 11

◾️ Recognizing the Misuse of CertiK's Brand - 31

◾️ UtopiaSphere Incident Analysis - 22

◾️ WazirX Hack Incident Analysis - 222

◾️ Hedgey Finance Event Analysis - 13

◾️ OKX and CertiK Fast Pass Program - 22

◾️ Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights - 12

◾️ Hack3d Report Q2 H1 2024 - Part 2: Insights Future Security Enhancements - 13

◾️ HACK3D Part 1: Top Incident Analyses - 132

◾️ HACK3D Part 2: Private Key Compromise - 422

◾️ HACK3D Part 3: Rounding Issue Exploits - 412

◾️ Build trust and integrity in project teams with KYC - 134

◾️ KYC Actors are Ramping Up Their Game - 242

◾️ Best Tools for Tracking Top Crypto Wallets - 322

◾️ How CertiK Does KYC - 112

◾️ Basics of Hackathons - 22

◾️ Vanity Address and Address Poisoning - 222

◾️ Normie Incident Analysis - 11

◾️ Understanding the DeRec Alliance - 211

◾️ FBI warns of Crypto Social Engineering - 232

◾️ Web2 Meets Web3: Hacking Decentralized Applications - 232

◾️ Evaluating Popular Web3 Messaging Apps - 44

◾️ Understanding AI's Role in Enhancing Web3 Security - 232

◾️ CertiK Uncovers Vulnerability in Apple Vision Pro - 232

◾️ A $230M Bitcoin Scam Uncovered - 22

◾️ How Binance Clawed Back $73M in Stolen Funds - 212

◾️ Introduction to Account Abstraction - 24

◾️ Mastering Bridge Tracing - 322

◾️ The Memecoin Markets of Springfield - 123

◾️ Bot-Driven Wash Trading in Exit Scams - 1/12/123

◾️ Sonne Finance Incident Analysis - 12

◾️ Understanding BGP Hijacking and Internet Routing Security - 1/234/1

◾️ Advanced Formal Verification of ZK Proofs - 22

◾️ How AI is Transforming KYC for Crypto Project Teamsт - 21

◾️ Understanding Chain Hopping and Crypto Money Laundering - 22

◾️ Hack3d Part 1: Most Common Attack Vectors in Q3 2024 - 23

◾️ Hack3d Part 2: Major Hacks of Q3 2024 - 21

◾️ Interview with Professor Ronghui Gu: "Who Monitors the Monitors?" - 323

◾️ Understanding U.S. Crypto Tax Forms - 222

◾️ Exploring the Rise of AI Memecoins - 232

◾️ Proof of History Overview - 2312

◾️ Unmasking Crypto Market Manipulation -

◾️ AI Memecoins Explained: The New Craze in Crypto - 22

◾️ Truth Terminal - An AI and a Crypto Millionaire - 23

◾️ The Power of Hashing - 2/12

◾️ Evaluating Memecoin Liquidity - 222

PROJECT FOCUS:

◾️ Trinique | RAT - 313

◾️ PAW Chain | Ecosystem - 324

◾️ HanChain | Transforming Music Copyr. - 111

◾️ OpenGPU | Harn. Decentr. GPU... - 1222

◾️ Patex | Latin American Blockchain... - 3212

◾️ Script Network | Open Source... - 2322

◾️ Solidus AI Tech | High-Perf. - 124/2/2/3

◾️ Mintlayer | Build on Bitcoin - 3232

◾️ MINT - 2231

◾️ PEPE | Meme - 22

◾️ Aptos | Layer 1 - 21

◾️ Ondo Finance | RWA - 12

◾️ Arbitrum | Layer 2 - 13

◾️ TON | Layer 1 - 22

◾️ Ripple (XRP Ledger) | Layer 1 - 32

◾️ Wormhole | Infrastructure - 13

◾️ Polymarket | Prediction Markets - 233

◾️ WEXO | Global Payment Infr. - 2222

◾️ OKX Wallet | Multi-Chain Web3 Wallet - 22

◾️ EigenLayer | Infrastructure - 22

◾️ Ethena | Stablecoin - 32

◾️ FriendTech | Social - 22

◾️ Worldcoin | Store of Value - 11

◾️ Phantom Wallet | Solana and Web3 Wallet - 212

◾️ MetaMask Overview - 223

◾️ Pump.Fun - 322

◾️ GOAT | AI Bot Meme - 222

◾️ Enhancing Security Awareness for Web3 Desktop Wallets - 31

◾️ CryptoBottle Incident Analysis - 424

◾️ Cybersecurity Best Practices for Telegram - 322

◾️ Understanding Stablecoin Reserves - 222

◾️ Multi-Signature Wallets Explained - 432

◾️ TNQ - 314

◾️ Securing Solana SPL Contracts - 23

◾️ How to Ace the CertiK KYC Badge - 144

◾️ Protecting Against Crypto Phishing Scams During the Holiday Season - 222

◾️ Stablecoin Risks: Identifying and Mitigating Vulnerabilities - 133

◾️ Understanding the Polter Finance Exploit - 123

◾️ Understanding SkyNode: Blockchain’s Secure Foundation - 211

◾️ Clipper DEX Withdrawal Vulnerability Exploit - 222

◾️ World of Dypians | Future of Gaming, DeFi, NFTs and AI - 223

◾️ Unlocking Ethereum ETFs With BlackRock’s ETHA - 121

◾️ Fundraising in the Web3 Industry -

◾️ Blockchain Data Protection and Privacy Compliance - 43

◾️ Quantum Computing and the Future of Cryptocurrency Security - 431

◾️ CertiK Hack3d 2024 Part 1 - Web3 Security by the Numbers - 243

◾️ CertiK Hack3d 2024 Part 2 - Uncovering Major Incidents - 212

◾️ CertiK Hack3d 2024 Part 3 - Building a Resilient Web3 Ecosystem - 13

◾️ Massa | The First Decentralized Cloud Network - 423

◾️ Kendu Inu | Organic Meme Community - 42

◾️ Protecting Web3 Workers from Fake Meeting App Scams - 112

◾️ Scam Pattern on Telegram Safeguard - 3/1234

◾️ Protect your cryptocurrency from dust attacks - 23

◾️ Exploring PSBT in Bitcoin DeFi Ecosystem - 212

◾️ SpunkySDX | Revolutionizing Commerce with Blockchain and AI - 234

◾️ Ice Open Network | A Blueprint for a New Internet - 12

◾️ The Scam Contract Behind Transaction Simulation Spoofing - 41

◾️ Transaction Simulation Spoofing – How It Happens and How to Prevent It - 23

◾️ Protecting Your Crypto in 2025 - 234

◾️ Understanding Uniswap V4 Hooks and Their Security Implications - 141

◾️ E Money Network | The World's First BankFi Network - 234

◾️ Portkey Wallet | A secure and easy gateway to Web3 - 223

◾️ Cryptocurrency and IoT Security - How Smart Devices Can Be Hacked - 2133

◾️ Crypto and AI: Can Artificial Intelligence Protect or Steal Your Crypto? - 2311

◾️ The Psychology of Crypto Scams: Why Do People Keep Falling for Them? - 2234

◾️ Haven1 | Safehaven EVM Blockchain - 332

◾️ Edu3Labs Academy | Pathway to Web3 Entrepreneurship - 331

◾️ ChainGPT | AI-Powered Solutions for Blockchain & Crypto - 242

◾️ Baby Neiro | The Next-Gen Meme Token Revolution - 121

◾️ Bonk | More Than Ordinary (Dog) - 312

◾️ Comparing Solana and Ethereum Transaction Processing Models - 4231

◾️ MEV and Trading Bots on Solana - 2121

◾️ Enhanced Safeguarding for Crypto Wallets - 2413

◾️ NFT Smart Contract Vulnerabilities - 4322

◾️ HACK3D Q1 2025 Quest - 1213

◾️ Oracle Manipulation in DeFi - 2133

◾️ Decentralized Identity and Privacy - 212//13

◾️ Smart Contract Upgrade Exploits - 2132

◾️ Crypto Mixers and Cross-Chain Bridges - 3243

◾️ Pig Butchering - 1432

◾️ Staff Accounting Bulletin No.122 - 4212

◾️ Eclipse Attack - 2112

◾️ Eavesdropping Attack - 1221

◾️ The MIM Spell Exploit on 25 March 2025 - 1314

◾️ Interoperable Programmable Token Design on Cardano (CIP-113/143) - 4124

◾️ A New Era in Web3 Fundraising — Opportunities and Challenges - 1331

◾️ Understanding the Hong Kong SFC A-S-P-I-Re Roadmap for Virtual Assets - 2124

◾️ Move for Solidity Developers I: Storage and Access Control - 2332

◾️ Uniswap V4: Hooks Security Considerations - 2431

◾️ Ethereum's Pectra Upgrade - 1332

◾️ H.R.1122 - CBDC Anti-Surveillance State Act - 4213

◾️ EVM – Cosmos Convergence Research (Part 1) - 2441

◾️ Telegram Web3 Crypto Scams - 2412

◾️ BitDCA | A New Way to Own Bitcoin - 23



Про все ретроактивности пишу тут: @cashinthetrash

Пообщаться можно здесь: @cashinthetrashotvet