October 11

Certik. Бесплатный дроп за 1,5 часа?

Certik - это компания, занимающаяся безопасностью блокчейна

Инвестиции: $141m от Binance Labs, Sequoia Capital, Coinbase Ventures и др

Twitter Score: 144 из 1000. На уровне Scroll

Вложения: 0$
Время выполнения: 1,5 часа

С чего начать?

- Переходим на сайт skynet.certik.com и регистрируемся

- Сверху справа заходим в профиль и привязываем свой кошелек

- В левом меню заходим во вкладку Quest и выполняем задания

- Собираем все задания, зарабатываем гемы, делаем daily задания

Список ответов на все 150 квестов: SKYNET RATING:

◾️ Welcome to Skynet Quest -

◾️ Web3 Security with Skynet - 22

◾️ CertiK Ventures - 31

◾️ Code Security - 21

◾️ Operational Security - 13

◾️ Governance and Security in DAOs - 21

◾️ Market-Related Risks - 21

◾️ Community and Security Risks in Web3 - 22

◾️ Introduction to User Security - 12

◾️ Team and Insider Risks - 12

◾️ Security Score Impacts with OKX - 12

◾️ Proof of Work versus Proof of Stake - 142

◾️ Skynet Pulse - Real-Time Ins. by Sec - 23

◾️ Insights on Market Analytics - 3/123/1

◾️ Apple Recognizes CertiK - 323

◾️ Solidus AI Tech | High-Perf. - 123/2/2/3

◾️ Evaluating Security with Skynet Tok - 242

◾️ Stay Ahead with Skynet's Smart Cal. - 12

◾️ Empow. Y. Web3 Journ. Adv. Sec. - 322

◾️ Prior. Wallet Sec. with Sky. W. Scan. - 22

◾️ KYC Leaderboard Showcase - 22

◾️ Operational Security via Website Scan - 134/1/2

◾️ GitHub Monitoring for Better Code Security - 422

◾️ Governance Activity Monitoring - 123

◾️ Insights on Token Holder Analysis - 241

◾️ Security Rating for Pre-Launch Projects - 434

◾️ RWA Security and Leaderboard - 22

◾️ CertiK Ventures Announcement in Singapore - 4/12/4

◾️ How the DHS is Stopping Ransomware Attacks - 123

WEB3 SECURITY:

◾️ Introduction to Wallet Security - 11

◾️ Best Practices for Wallet Security - 43

◾️ Choosing a Secure Exchange - 41

◾️ Intro to Crypto Drainers - 41

◾️ Proof of Reserve - 24

◾️ Recognizing Risk Signals on the Exch. - 13

◾️ Introduction to User Security - 12

◾️ Protecting Yours. from Disc. Scams - 23

◾️ Website & dApp Security - 21

◾️ Private Key Security - 24

◾️ Private Key Security: Seed Phrases - 13

◾️ Evaluating Cryptocurr. News Sources - 1/1234

◾️ Protecting Your SQL Data... - 222

◾️ DEXTools | Real-Time Trading Ins. - 232

◾️ Important Exchange Security Features - 31

◾️ Understanding the Peel Chain Technique - 23

◾️ Losses Related to Private Key Compromises - 13

◾️ Stay Vigilant on Browser Plugins - 3/123

◾️ Understanding and Preventing Sybil Attacks - 141

◾️ How to Create and Maintain Secure Passwords - 222

◾️ What Is a Keylogger? - 12

◾️ Identifying Malicious Activity on Websites & dApps - 12

◾️ Exploring Etherscan - 221

◾️ Protecting Against Social Engineering Attacks - 223

◾️ Navigating NFT Security and Avoiding Scams - 223

◾️ Intro to AML and its Role in Crypto - 321

◾️ Secure Use of Exchanges - 231

◾️ Case Study on Enhancing Security for App Chains - 22

◾️ SOC 2 Compliance for Crypto Companies - 212

◾️ Understanding and Mitigating 51% Attacks - 222

◾️ Setting Up a Security War Room - 223

◾️ SIM Swap Attacks - 13/3

◾️ Common Web3 Phishing Methods - 12

◾️ Understanding Economic Exploits and Tokenomics - 221

◾️ Understanding Soft Rug vs. Hard Rug Pulls - 22

◾️ Hackers Infiltrating Crypto Job Boards - 332

◾️ Intro to Airdrop Scams - 2/123

◾️ Importance of Bug Bounty Programs in Web3 - 12

◾️ About Satoshi Nakamoto - 233

◾️ What is DePIN? - 23

◾️ Radiant Capital’s $50M DeFi Hack Response - 233

◾️ Defending Against Clipper Malware - 233

◾️ Exploring the Security Model for Optimism’s Superchain - 222

◾️ Case Study on the Risks of Phishing Attacks in DeFi - 313

SECURITY ANALYSIS

◾️ Analyzing Security Solana-Based Memecoins with CertiK’s Token Scan - Part 1 - 212

◾️ Analyzing Security Solana-Based Memecoins CertiK’s Token Scan - Part 2 - 222

CERTIK BLOG:

◾️ SkyInsights: Crypto Compliance - 32/124

◾️ SkyKnight - 232

◾️ Top Perf. Cryptocurr. of H1 2024 - 24

◾️ CertiK's Jour. to Sams. Sec. Hall... - 222

◾️ Navig. DAO Gov. and the Comp... - 232

◾️ Underst. the Android SpyAgent... - 22

◾️ Unveiling the KYC Actor Industry - 124

◾️ Top Compliance Risks in Crypto - 221

◾️ Underst. the Imp. of FIT21 on Cryp. Comp. - 1/2/1234

◾️ Cold Wallets - 2/124/14

◾️ Trap Phishing on Trusted Platforms - 21

◾️ Different Mechanisms for Honeypot Scams - 12

◾️ Introduction to Formal Verification - 11

◾️ Ordinals and the BRC-20 Standard - 21

◾️ How Exit Scammers Mint Tokens Undetected - 21

◾️ Introduction of Diamond Agency Contract - 11

◾️ Recognizing the Misuse of CertiK's Brand - 31

◾️ UtopiaSphere Incident Analysis - 22

◾️ WazirX Hack Incident Analysis - 222

◾️ Hedgey Finance Event Analysis - 13

◾️ OKX and CertiK Fast Pass Program - 22

◾️ Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights - 12

◾️ Hack3d Report Q2 H1 2024 - Part 2: Insights Future Security Enhancements - 13

◾️ HACK3D Part 1: Top Incident Analyses - 132

◾️ HACK3D Part 2: Private Key Compromise - 422

◾️ HACK3D Part 3: Rounding Issue Exploits - 412

◾️ Build trust and integrity in project teams with KYC - 134

◾️ KYC Actors are Ramping Up Their Game - 242

◾️ Best Tools for Tracking Top Crypto Wallets - 322

◾️ How CertiK Does KYC - 112

◾️ Basics of Hackathons - 22

◾️ Vanity Address and Address Poisoning - 222

◾️ Normie Incident Analysis - 11

◾️ Understanding the DeRec Alliance - 211

◾️ FBI warns of Crypto Social Engineering - 232

◾️ Web2 Meets Web3: Hacking Decentralized Applications - 232

◾️ Evaluating Popular Web3 Messaging Apps - 44

◾️ Understanding AI's Role in Enhancing Web3 Security - 232

◾️ CertiK Uncovers Vulnerability in Apple Vision Pro - 232

◾️ A $230M Bitcoin Scam Uncovered - 22

◾️ How Binance Clawed Back $73M in Stolen Funds - 212

◾️ Introduction to Account Abstraction - 24

◾️ Mastering Bridge Tracing - 322

◾️ The Memecoin Markets of Springfield - 123

◾️ Bot-Driven Wash Trading in Exit Scams - 1/12/123

◾️ Sonne Finance Incident Analysis - 12

◾️ Understanding BGP Hijacking and Internet Routing Security - 1/234/1

◾️ Advanced Formal Verification of ZK Proofs - 22

◾️ How AI is Transforming KYC for Crypto Project Teamsт - 21

◾️ Understanding Chain Hopping and Crypto Money Laundering - 22

◾️ Hack3d Part 1: Most Common Attack Vectors in Q3 2024 - 23

◾️ Hack3d Part 2: Major Hacks of Q3 2024 - 21

◾️ Interview with Professor Ronghui Gu: "Who Monitors the Monitors?" - 323

◾️ Understanding U.S. Crypto Tax Forms - 222

◾️ Exploring the Rise of AI Memecoins - 232

◾️ Proof of History Overview - 2312

◾️ Unmasking Crypto Market Manipulation -

◾️ AI Memecoins Explained: The New Craze in Crypto - 22

◾️ Truth Terminal - An AI and a Crypto Millionaire - 23

◾️ The Power of Hashing - 2/12

◾️ Evaluating Memecoin Liquidity - 222

PROJECT FOCUS:

◾️ Trinique | RAT - 313

◾️ PAW Chain | Ecosystem - 324

◾️ HanChain | Transforming Music Copyr. - 111

◾️ OpenGPU | Harn. Decentr. GPU... - 1222

◾️ Patex | Latin American Blockchain... - 3212

◾️ Script Network | Open Source... - 2322

◾️ Solidus AI Tech | High-Perf. - 124/2/2/3

◾️ Mintlayer | Build on Bitcoin - 3232

◾️ MINT - 2231

◾️ PEPE | Meme - 22

◾️ Aptos | Layer 1 - 21

◾️ Ondo Finance | RWA - 12

◾️ Arbitrum | Layer 2 - 13

◾️ TON | Layer 1 - 22

◾️ Ripple (XRP Ledger) | Layer 1 - 32

◾️ Wormhole | Infrastructure - 13

◾️ Polymarket | Prediction Markets - 233

◾️ WEXO | Global Payment Infr. - 2222

◾️ OKX Wallet | Multi-Chain Web3 Wallet - 22

◾️ EigenLayer | Infrastructure - 22

◾️ Ethena | Stablecoin - 32

◾️ FriendTech | Social - 22

◾️ Worldcoin | Store of Value - 11

◾️ Phantom Wallet | Solana and Web3 Wallet - 212

◾️ MetaMask Overview - 223

◾️ Pump.Fun - 322

◾️ GOAT | AI Bot Meme - 222

◾️ Enhancing Security Awareness for Web3 Desktop Wallets - 31

◾️ CryptoBottle Incident Analysis - 424

◾️ Cybersecurity Best Practices for Telegram - 322

◾️ Understanding Stablecoin Reserves - 222

◾️ Multi-Signature Wallets Explained - 432

◾️ TNQ - 314

◾️ Securing Solana SPL Contracts - 23

◾️ How to Ace the CertiK KYC Badge - 144

◾️ Protecting Against Crypto Phishing Scams During the Holiday Season - 222

◾️ Stablecoin Risks: Identifying and Mitigating Vulnerabilities - 133

◾️ Understanding the Polter Finance Exploit - 123

◾️ Understanding SkyNode: Blockchain’s Secure Foundation - 211

◾️ Clipper DEX Withdrawal Vulnerability Exploit - 222

◾️ World of Dypians | Future of Gaming, DeFi, NFTs and AI - 223

◾️ Unlocking Ethereum ETFs With BlackRock’s ETHA - 121

◾️ Fundraising in the Web3 Industry -

◾️ Blockchain Data Protection and Privacy Compliance - 43




Про все ретроактивности пишу тут: @cashinthetrash

Пообщаться можно здесь: @cashinthetrashotvet