Certik. Бесплатный дроп за 1,5 часа?
Certik - это компания, занимающаяся безопасностью блокчейна
Инвестиции: $141m от Binance Labs, Sequoia Capital, Coinbase Ventures и др
Twitter Score: 144 из 1000. На уровне Scroll
Вложения: 0$
Время выполнения: 1,5 часа
- Переходим на сайт skynet.certik.com и регистрируемся
- Сверху справа заходим в профиль и привязываем свой кошелек
- В левом меню заходим во вкладку Quest и выполняем задания
- Собираем все задания, зарабатываем гемы, делаем daily задания
Список ответов на все 150 квестов: SKYNET RATING:
◾️ Web3 Security with Skynet - 22
◾️ Governance and Security in DAOs - 21
◾️ Community and Security Risks in Web3 - 22
◾️ Introduction to User Security - 12
◾️ Team and Insider Risks - 12
◾️ Security Score Impacts with OKX - 12
◾️ Proof of Work versus Proof of Stake - 142
◾️ Skynet Pulse - Real-Time Ins. by Sec - 23
◾️ Insights on Market Analytics - 3/123/1
◾️ Apple Recognizes CertiK - 323
◾️ Solidus AI Tech | High-Perf. - 123/2/2/3
◾️ Evaluating Security with Skynet Tok - 242
◾️ Stay Ahead with Skynet's Smart Cal. - 12
◾️ Empow. Y. Web3 Journ. Adv. Sec. - 322
◾️ Prior. Wallet Sec. with Sky. W. Scan. - 22
◾️ KYC Leaderboard Showcase - 22
◾️ Operational Security via Website Scan - 134/1/2
◾️ GitHub Monitoring for Better Code Security - 422
◾️ Governance Activity Monitoring - 123
◾️ Insights on Token Holder Analysis - 241
◾️ Security Rating for Pre-Launch Projects - 434
◾️ RWA Security and Leaderboard - 22
◾️ CertiK Ventures Announcement in Singapore - 4/12/4
◾️ How the DHS is Stopping Ransomware Attacks - 123
◾️ Introduction to Wallet Security - 11
◾️ Best Practices for Wallet Security - 43
◾️ Choosing a Secure Exchange - 41
◾️ Intro to Crypto Drainers - 41
◾️ Recognizing Risk Signals on the Exch. - 13
◾️ Introduction to User Security - 12
◾️ Protecting Yours. from Disc. Scams - 23
◾️ Website & dApp Security - 21
◾️ Private Key Security: Seed Phrases - 13
◾️ Evaluating Cryptocurr. News Sources - 1/1234
◾️ Protecting Your SQL Data... - 222
◾️ DEXTools | Real-Time Trading Ins. - 232
◾️ Important Exchange Security Features - 31
◾️ Understanding the Peel Chain Technique - 23
◾️ Losses Related to Private Key Compromises - 13
◾️ Stay Vigilant on Browser Plugins - 3/123
◾️ Understanding and Preventing Sybil Attacks - 141
◾️ How to Create and Maintain Secure Passwords - 222
◾️ Identifying Malicious Activity on Websites & dApps - 12
◾️ Protecting Against Social Engineering Attacks - 223
◾️ Navigating NFT Security and Avoiding Scams - 223
◾️ Intro to AML and its Role in Crypto - 321
◾️ Secure Use of Exchanges - 231
◾️ Case Study on Enhancing Security for App Chains - 22
◾️ SOC 2 Compliance for Crypto Companies - 212
◾️ Understanding and Mitigating 51% Attacks - 222
◾️ Setting Up a Security War Room - 223
◾️ Common Web3 Phishing Methods - 12
◾️ Understanding Economic Exploits and Tokenomics - 221
◾️ Understanding Soft Rug vs. Hard Rug Pulls - 22
◾️ Hackers Infiltrating Crypto Job Boards - 332
◾️ Intro to Airdrop Scams - 2/123
◾️ Importance of Bug Bounty Programs in Web3 - 12
◾️ About Satoshi Nakamoto - 233
◾️ Radiant Capital’s $50M DeFi Hack Response - 233
◾️ Defending Against Clipper Malware - 233
◾️ Exploring the Security Model for Optimism’s Superchain - 222
◾️ Case Study on the Risks of Phishing Attacks in DeFi - 313
◾️ Analyzing Security Solana-Based Memecoins with CertiK’s Token Scan - Part 1 - 212
◾️ Analyzing Security Solana-Based Memecoins CertiK’s Token Scan - Part 2 - 222
◾️ SkyInsights: Crypto Compliance - 32/124
◾️ Top Perf. Cryptocurr. of H1 2024 - 24
◾️ CertiK's Jour. to Sams. Sec. Hall... - 222
◾️ Navig. DAO Gov. and the Comp... - 232
◾️ Underst. the Android SpyAgent... - 22
◾️ Unveiling the KYC Actor Industry - 124
◾️ Top Compliance Risks in Crypto - 221
◾️ Underst. the Imp. of FIT21 on Cryp. Comp. - 1/2/1234
◾️ Trap Phishing on Trusted Platforms - 21
◾️ Different Mechanisms for Honeypot Scams - 12
◾️ Introduction to Formal Verification - 11
◾️ Ordinals and the BRC-20 Standard - 21
◾️ How Exit Scammers Mint Tokens Undetected - 21
◾️ Introduction of Diamond Agency Contract - 11
◾️ Recognizing the Misuse of CertiK's Brand - 31
◾️ UtopiaSphere Incident Analysis - 22
◾️ WazirX Hack Incident Analysis - 222
◾️ Hedgey Finance Event Analysis - 13
◾️ OKX and CertiK Fast Pass Program - 22
◾️ Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights - 12
◾️ Hack3d Report Q2 H1 2024 - Part 2: Insights Future Security Enhancements - 13
◾️ HACK3D Part 1: Top Incident Analyses - 132
◾️ HACK3D Part 2: Private Key Compromise - 422
◾️ HACK3D Part 3: Rounding Issue Exploits - 412
◾️ Build trust and integrity in project teams with KYC - 134
◾️ KYC Actors are Ramping Up Their Game - 242
◾️ Best Tools for Tracking Top Crypto Wallets - 322
◾️ Vanity Address and Address Poisoning - 222
◾️ Normie Incident Analysis - 11
◾️ Understanding the DeRec Alliance - 211
◾️ FBI warns of Crypto Social Engineering - 232
◾️ Web2 Meets Web3: Hacking Decentralized Applications - 232
◾️ Evaluating Popular Web3 Messaging Apps - 44
◾️ Understanding AI's Role in Enhancing Web3 Security - 232
◾️ CertiK Uncovers Vulnerability in Apple Vision Pro - 232
◾️ A $230M Bitcoin Scam Uncovered - 22
◾️ How Binance Clawed Back $73M in Stolen Funds - 212
◾️ Introduction to Account Abstraction - 24
◾️ Mastering Bridge Tracing - 322
◾️ The Memecoin Markets of Springfield - 123
◾️ Bot-Driven Wash Trading in Exit Scams - 1/12/123
◾️ Sonne Finance Incident Analysis - 12
◾️ Understanding BGP Hijacking and Internet Routing Security - 1/234/1
◾️ Advanced Formal Verification of ZK Proofs - 22
◾️ How AI is Transforming KYC for Crypto Project Teamsт - 21
◾️ Understanding Chain Hopping and Crypto Money Laundering - 22
◾️ Hack3d Part 1: Most Common Attack Vectors in Q3 2024 - 23
◾️ Hack3d Part 2: Major Hacks of Q3 2024 - 21
◾️ Interview with Professor Ronghui Gu: "Who Monitors the Monitors?" - 323
◾️ Understanding U.S. Crypto Tax Forms - 222
◾️ Exploring the Rise of AI Memecoins - 232
◾️ Proof of History Overview - 2312
◾️ Unmasking Crypto Market Manipulation -
◾️ AI Memecoins Explained: The New Craze in Crypto - 22
◾️ Truth Terminal - An AI and a Crypto Millionaire - 23
◾️ The Power of Hashing - 2/12
◾️ Evaluating Memecoin Liquidity - 222
◾️ PAW Chain | Ecosystem - 324
◾️ HanChain | Transforming Music Copyr. - 111
◾️ OpenGPU | Harn. Decentr. GPU... - 1222
◾️ Patex | Latin American Blockchain... - 3212
◾️ Script Network | Open Source... - 2322
◾️ Solidus AI Tech | High-Perf. - 124/2/2/3
◾️ Mintlayer | Build on Bitcoin - 3232
◾️ Ripple (XRP Ledger) | Layer 1 - 32
◾️ Wormhole | Infrastructure - 13
◾️ Polymarket | Prediction Markets - 233
◾️ WEXO | Global Payment Infr. - 2222
◾️ OKX Wallet | Multi-Chain Web3 Wallet - 22
◾️ EigenLayer | Infrastructure - 22
◾️ Worldcoin | Store of Value - 11
◾️ Phantom Wallet | Solana and Web3 Wallet - 212
◾️ Enhancing Security Awareness for Web3 Desktop Wallets - 31
◾️ CryptoBottle Incident Analysis - 424
◾️ Cybersecurity Best Practices for Telegram - 322
◾️ Understanding Stablecoin Reserves - 222
◾️ Multi-Signature Wallets Explained - 432
◾️ Securing Solana SPL Contracts - 23
◾️ How to Ace the CertiK KYC Badge - 144
◾️ Protecting Against Crypto Phishing Scams During the Holiday Season - 222
◾️ Stablecoin Risks: Identifying and Mitigating Vulnerabilities - 133
◾️ Understanding the Polter Finance Exploit - 123
◾️ Understanding SkyNode: Blockchain’s Secure Foundation - 211
◾️ Clipper DEX Withdrawal Vulnerability Exploit - 222
◾️ World of Dypians | Future of Gaming, DeFi, NFTs and AI - 223
◾️ Unlocking Ethereum ETFs With BlackRock’s ETHA - 121
◾️ Fundraising in the Web3 Industry -
◾️ Blockchain Data Protection and Privacy Compliance - 43
Про все ретроактивности пишу тут: @cashinthetrash
Пообщаться можно здесь: @cashinthetrashotvet