اذا ما شفت طريق ال10 اضعاف شوفو من هون
https://t.me/hadibraytehh/3951
اذا بدّك تريّح راسك بموضوع الإكتتابات شوف هالفيديو
https://www.hadibrayteh.com/presentation-page
CertiK مشروع
يعتبر رقم 1 بالسوق بمجالو
من أهم المشاريع بالسوق المسؤول عن تدقيق المشاريع
141 المشروع جمع
binance مليون ومن ضمن مستثمريهم
عندهم مهام مجانية وسهلة حتى محفظة ما بدك
ممكن جدا يكون في ايردروب للأشخاص يلي بتشارك بهل حدث
أول شي اضغط على هيدا الرابط وبعدين وافق على شروطهم وعمول تسجيل دخول عن طريق جوجل اسهل شي
المهام كتيرة جدا وكلها عبارة عن أسئلة خيارات
الي يومين بشتغل بهل مشروع ولسا ما خلصتو
90% لأختصر عليكن
من الوقت والمجهود
ولقدرت جاوب عكلشي بشكل صحيح
انتبه وانت عم تجاوب عالأجوبة إذا بتجاوب 5 مرات خطأ بيخلصو القلوب يلي معك
تم تنسيق الأجوبة كلها مع الأسئلة
كل يلي عليك بتنسخ السؤال من موقع السيرتك
وبتجي لهون اول شي بتعملو بتضغط على الكيبورد
CTRL + F
وبتعمل لصق للسؤال..ففورا بيطلعلك الجواب
....وهكذا
(ТаскOndo Finance | RWA)
Question 1 of 2Ondo Finance moved $95 million to BlackRock's BUIDL in 2024 as part of their long-term strategy.
Answer:True
Question 2 of 2What specific actions does Ondo Finance take to ensure regulatory compliance?
Answer:Conducts compliance checks and engages with regulatory bodies
(Таск Web3 Security with Skynet)
Question 1 of 2
What feature of Skynet helps users assess the security of Web3 projects?
Answer: Security Scores
Question 2 of 2
Verified source code is one of the common security threats in Web3.
Answer:False
(Таск Operational Security)
Question 1 of 2
Non-blockchain components such as websites and software applications must be secured, as they can be targeted by hackers.
Answer: True
Question 2 of 2
What makes bug bounty programs beneficial for Web3 projects?
Answer: They harness community expertise to identify bugs
(Таск Team and Insider Risks)
Question 1 of 2
Why is it risky to invest in projects with anonymous teams?
Answer: Lack of accountability and transparency
Question 2 of 2
The CertiK KYC Badge means that CertiK ensures code safety.
Answer: False
(Таск PEPE | Meme)
Question 1 of 2
What significant security measures did Pepe implement to enhance trust and transparency?
Answer: Undergoing a CertiK audit of its token contract
Question 2 of 2
How is the ownership of Pepe tokens distributed among holders?
Answer:The top 10 holders own less than 5% of the total supply.
(Таск Aptos | Layer 1)
Question 1 of 2
Aptos is a Layer 1 blockchain primarily designed to offer:
Answer: A developer-friendly environment, focusing on scalability and security
Question 2 of 2
Move is the programming language at the core of Aptos for smart contract development.
Answer: True
(Таск Ondo Finance RWA)
Question 1 of 2
Ondo Finance moved $95 million to BlackRock's BUIDL in 2024 as part of their long-term strategy.
Answer: True
Question 2 of 2
What specific actions does Ondo Finance take to ensure regulatory compliance?
Answer: Conducts compliance checks and engages with regulatory bodies
(Таск TON | Layer 1)
Question 1 of 2
What does the MasterChain do in TON's network?
Answer:Ensures consistency and security across the network
Question 2 of 2
What peak transaction speed did TON achieve in CertiK's performance testing?
Answer:Over 100,000 TPS
(Таск Ripple (XRP Ledger) | Layer 1)
Question 1 of 2
What did CertiK audit for the XRP Ledger?
Answer:The security of its Automated Market Maker (AMM) implementation
Question 2 of 2
What do social monitoring insights indicate about the XRPL community?
Answer: Highly active and engaged
(Таск Wormhole | Infrastructure)
Question 1 of 2
Wormhole was originally incubated by Jump Trading
Answer:True
Question 2 of 2
What is the maximum bounty offered by Wormhole’s bug bounty program?
Answer: $5M
(Таск EigenLayer | Infrastructure)
Question 1 of 2
What unique model does EigenLayer use to enhance the security of other protocols?
Answer: Shared security model leveraging staked ETH
Question 2 of 2
What purpose does the insurance mechanism serve in EigenLayer's ecosystem?
Answer:To provide a safety net in case of protocol failures or hacks
(Таск Ethena | Stablecoin)
Question 1 of 2
What method does Ethena use to stabilize its synthetic dollar, USDe?
Answer: Delta hedging
Question 2 of 2
What unique financial tool does Ethena introduce to offer on-chain yields?
Answer: Internet Bond
(Таск Code Security)
Question 1 of 2
What is the main purpose of conducting security audits on Web3 code?
Answer:To identify and fix potential security vulnerabilities
Question 2 of 2
A code repository’s regular updates and community involvement can be indicators of the team’s commitment to a project.
Answer:True
(Таск Market-Related Risks)
Question 1 of 2
What is a risk associated with tokens being concentrated in few wallets?
Answer:It increases the risk of market manipulation
Question 2 of 2
Why is high trading activity viewed positively in token markets?
Answer: It indicates strong interest and potential liquidity.
(Таск Governance and Security in DAOs)
Question 1 of 2
Which issue is a common risk in DAO governance?
Answer: Centralization risks in smart contract
Question 2 of 2
Community approval is usually required before implementing changes to a DAO’s project model.
Answer:True
(Таск Community and Security Risks in Web3)
Question 1 of 2
Why is monitoring social media sentiment important for Web3 projects?
Answer:Influences market stability and trust
Question 2 of 2
Transparency decreases trust in the Web3 community and should be minimized.
Answer:False
(Таск Introduction to User Security)
Question 1 of 2
Why is user security particularly important in the world of crypto?
Answer: Because crypto assets are often held in decentralized wallets with no central authority to help recover lost funds
Question 2 of 2
What additional security measure is recommended beyond a strong password?
Answer:Two-Factor Authentication (2FA)
(Таск Introduction to Wallet Security)
Question 1 of 2
What is the primary risk of using custodial wallets?
Answer: If the custodial service experiences a security breach, hack, or service itself becomes inaccessible, you may lose access to your private keys.
Question 2 of 2
What is a key practice for securing your wallet’s private keys?
Answer: Storing them in a hardware wallet or encrypted offline location
(Таск Best Practices for Wallet Security)
Question 1 of 2
What should you regularly do with your wallet to ensure security?
Answer:All of the above
Question 2 of 2
What should you always double-check before sending funds from your wallet?
Answer:The recipient’s wallet address to ensure it’s correct
(Таск Choosing a Secure Exchange)
Question 1 of 2
Which of the following are key factors to consider when choosing a secure crypto exchange?
Answer: All of the above
Question 2 of 2
Choosing an exchange with both licensing and security certifications minimizes the risks associated with using a cryptocurrency exchange.
Answer: True
(Таск Proof of Reserve )
Question 1 of 2
Proof of Reserve (PoR) guarantees against future changes and hacking risks.
Answer:False
Question 2 of 2
What is a limitation of Proof of Reserve?
Answer:All of the above
(Таск Recognizing Risk Signals on the Exchange)
Question 1 of 2
Why should you be cautious if someone you don't know approaches you on social media about using a specific exchange?
Answer: They might be recommending a scam or fraudulent scheme
Question 2 of 2
What could frequent or prolonged withdrawal freezes on an exchange indicate?
Answer:The exchange has liquidity problems or internal issues
(Таск Important Exchange Security Features)
Question 1 of 2
What does ISO 27001 certification signify for a cryptocurrency exchange?
Answer:The exchange has strong information security management systems
Question 2 of 2
What is the benefit of choosing an exchange with both proper licensing and security certifications?
Answer:It minimizes the risks associated with using a cryptocurrency exchange
(Таск Private Key Security)
Question 1 of 2
Why is it important to keep your private key secure?
Answer:If someone gains access to your private key, they gain access to your crypto assets
Question 2 of 2
What is a best practice for private key security?
Answer:Store it offline, preferably in a hardware wallet
(Таск Private Key Security: Seed Phrases)
Question 1 of 2
What is a recommended strategy for backing up your seed phrase?
Answer:Create a backup and store it in secure locations
Question 2 of 2
What is the main risk of storing your seed phrase digitally (e.g., in cloud storage or email)?
Answer:It can be hacked or accessed by unauthorized parties
(Таск Losses Related to Private Key)
Question 1 of 2
How much was lost due to private key compromises in 2023?
Answer:Nearly $881 million across 47 incidents
Question 2 of 2
Which of these exchanges did NOT experience a security incident related to a private key compromise?
Answer:Binance
(Таск Website & dApp Security)
Question 1 of 2
A dApp is a centralized application that primarily runs on mobile devices.
Answer:False
Question 2 of 2
What might indicate that a dApp is potentially malicious or risky?
Answer:The dApp has limited documentation and transparency
(Таск Identifying Malicious Activity on Websites & dApps)
Question 1 of 2
How can you protect yourself from phishing attacks related to crypto websites and dApps?
Answer:Be cautious with emails and messages that ask for sensitive information, and always verify links and URLs before clicking
Question 2 of 2
What might indicate that a website is a scam or fake?
Answer:The URL has subtle differences from the legitimate site, like extra characters or misspellings
(Таск FriendTech | Social)
Question 1 of 2
Friend.Tech launched its native token in May 2024, distributing it entirely to VCs.
Answer:False
Question 2 of 2
What incentive does Friend.Tech provide through its bug bounty program?
Answer:Rewards of up to 1,000,000 USDC based on bug severity
(Таск Worldcoin | Store of Value)
Question 1 of 2
Worldcoin uses biometric verification to ensure each person can only claim their share once.
Answer:True
Question 2 of 2
What was a security vulnerability in Worldcoin’s Orb operator onboarding process?
Answer:Operators could bypass verification without proper ID.
(Таск Losses Related to Private Key Compromises)
Question 1 of 2
How much was lost due to private key compromises in 2023?
Answer:Nearly $881 million across 47 incidents
Question 2 of 2Which of these exchanges did NOT experience a security incident related to a private key compromise?
Answer:Binance
(Таск HACK3D Part 1: Top Incident Analyses)
Question 1 of 3
Which of the following is NOT listed as a top incident type in Q1 2024?
Answer:Network Congestion
Question 2 of 3
What was the eventual outcome of the attack on Munchables?
Answer:The stolen assets were returned to the Munchables team
Question 3 of 3
What event occurred shortly before the BitForex exit scam, raising suspicions of fraudulent activities?
Answer: The CEO's resignation
(Таск HACK3D Part 2: Private Key Compromise)
Question 1 of 3
What was the total loss attributed to private key compromises in Q1 2024?
Answer:$239 million
Question 2 of 3
Who suffered a loss of $112 million due to the compromise of personal private keys in Q1 2024?
Answer:Chris Larsen
Question 3 of 3
Storing all multisignature keys within the same BitWarden account is a secure practice.
Answer: False
(Таск HACK3D Part 3: Rounding Issue Exploits)
Question 1 of 3
What is the primary target of the Rounding Issue Exploit?
Answer:Newly-deployed lending pools
Question 2 of 3
What was the outcome of the flaw exploited in the Kyberswap incident?
Answer:Drainage of funds
Question 3 of 3
Solidity's computational libraries are designed for high-precision mathematical operations, minimizing the risk of rounding errors.
Answer:False
(Таск Build trust and integrity in project teams with KYC)
Question 1 of 3
Why is KYC important for Web3 projects?
Answer: It helps users trust the team behind a project
Question 2 of 3
What does a CertiK KYC badge signify?
Answer: The project team has undergone a thorough identity verification process
Question 3 of 3
How does CertiK's KYC service protect against insider threats?
Answer:By conducting rigorous identity checks on core team members
(Таск KYC Actors are Ramping Up Their Game)
Question 1 of 3
What is a key observation by CertiK regarding KYC fraud?
Answer:Fraudsters are hiring professional actors to circumvent due diligence
Question 2 of 3
What is CertiK's KYC Badge designed to do?
Answer:Verify development teams and prevent fraud
Question 3 of 3
Why do KYC actors target traditional banks?
Answer:To open bank accounts and store illicit funds
(Таск Unveiling the KYC Actor Industry)
Question 1 of 3
What insight did CertiK gain from a KYC actor?
Answer:Passing regular verifications is easy
Question 2 of 3
What is the primary purpose of employing KYC actors according to CertiK's findings?
Answer:To steal funds from investors
Question 3 of 3
What is essential for due diligence in Web3 start-ups according to CertiK?
Answer:Thorough background investigation by professional investigators
(Таск Best Tools for Tracking Top Crypto Wallets)
Question 1 of 3
Which wallet tracking tool supports creating custom dashboards with personalized wallet insights?
Answer:Dune Analytics
Question 2 of 3
Wallet tracking tools offer specific trading directions to make users money.
Answer:False
Question 3 of 3
What does wallet tracking help with?
Answer: Monitoring crypto market trends
(Таск How CertiK Does KYC)
Question 1 of 3
CertiK's KYC Badge process includes a video interview and identity verification to assess the background of key team members.
Answer:True
Question 2 of 3
What are the main steps in CertiK's KYC verification process?
Answer:Video Call, ID Check, Review & Award
Question 3 of 3
The CertiK KYC Badge means that CertiK ensures code safety.
Answer:False
(Таск Trap Phishing on Trusted Platforms)
Question 1 of 2
What are phishers trying to obtain from users in Web3 phishing scams?
Answer:Crypto wallet private keys and mnemonic phrases
Question 2 of 2
Phishing malware can steal private keys by asking users to download and run a fake game client.
Answer:True
(Таск Different Mechanisms for Honeypot Scams)
Question 1 of 2
What is a common red flag that a token may be a honeypot scam?
Answer:An all-green chart with no sells
Question 2 of 2
The blacklist mechanism in honeypot scams adds buyers to a whitelist, enabling them to sell their tokens freely.
Answer:False
(Таск Introduction to Formal Verification)
Question 1 of 2
Formal verification is a mathematical approach that helps identify vulnerabilities not found through conventional testing or code reviews.
Answer:True
Question 2 of 2
What does the specification language BISSOL help with in the formal verification process?
Answer:Defining properties of contracts to be verified
(Таск How Exit Scammers Mint Tokens Undetected)
Question 1 of 2
What do exit scammers use to mint additional tokens without triggering a Transfer event?
Answer:Bypassing the totalSupply metric
Question 2 of 2
Locked liquidity pool tokens create a false sense of security for investors during a rug pull scam.
Answer: True
(Таск Introduction of Diamond Agency Contract)
Question 1 of 2
Facets in diamond proxy contracts are smaller contracts that implement specific features and are managed by a central diamond proxy.
Answer:True
Question 2 of 2
Why should the initialize function be protected in diamond proxies?
Answer:To prevent unauthorized access to privileged roles
(Таск Recognizing the Misuse of CertiK's Brand)
Question 1 of 2
What should you do if you're approached by someone claiming to represent CertiK but you doubt their legitimacy?
Answer:Verify their credentials using CertiK’s Employee Verification tool
Question 2 of 2
Fake recovery services often target individuals who have already suffered financial losses, promising to recover funds but demanding upfront fees.
Answer:True
(Таск Top Compliance Risks in Crypto)
Question 1 of 3
Which compliance risk involves using blockchain transactions for illegal activities like money laundering or terrorism financing?
Answer:Exposure to illicit activities
Question 2 of 3
CertiK’s SkyInsights analyzes transaction fees and doesn’t help companies comply with global regulations.
Answer:False
Question 3 of 3
How does SkyInsights help companies comply with global crypto regulations?
Answer:By maintaining a repository of global regulations
(Таск Hedgey Finance Event Analysis)
Question 1 of 2
The Hedgey Finance exploit was due to a missing line of code that failed to revoke campaign approvals after cancellations, allowing unauthorized token transfers.
Answer:True
Question 2 of 2
How much was initially stolen in the Hedgey Finance exploit?
Answer: $2 million
(Таск Insights on Market Analytics)
Question 1 of 3
Which of the following metrics is NOT included in the Skynet Market Analytics section?
Answer:Fully diluted market cap
Question 2 of 3
Which of the following factors might contribute to a potential drop in the Market Category Score? (Select all that apply)
Answer:1-2-3
Question 3 of 3
Skynet Security Score incorporates insights from Market Analytics.
Answer: True
(Таск Operational Security via Website Scan)
Question 1 of 3
Which are the primary categories of Website Scan? (Select all that apply)
Answer: 1-3-4
Question 2 of 3
Negative scan results could suggest a project’s lack of attention to security.
Answer:True
Question 3 of 3
Further assessment and improvement of website security can be achieved through?
Answer: Penetration Testing
(Таск GitHub Monitoring for Better Code Security)
Question 1 of 3
Which of the following factors are considered by the GitHub Impact Indicator?
Answer: All of the above
Question 2 of 3
If a project has a long existing GitHub account, age > 8 years, that means the project is secure and actively maintained?
Answer: False
Question 3 of 3
Good looking Activity Heatmap means improved code security
Answer: False - Introducing new code may also introduce bugs and vulnerabilities
(Таск Governance Activity Monitoring)
Question 1 of 3
Which of the statements best describes the governance indicator mentioned?
Answer:It reflects the level of governance activity in comparison to other Web3 projects by aggregating various signals
Question 2 of 3
Projects with low governance activity indicators suggests lower risk compared to higher ones.
Answer:False
Question 3 of 3
Which of the following values is not conveyed by governance activity?
Answer:Project's financial performance
(Таск Insights on Token Holder Analysis)
Question 1 of 3
Governance related metrics such as token holder changes won’t impact Skynet security rating.
Answer:False
Question 2 of 3
Which of the following metrics is NOT included in the Skynet Token Holder Analytics section?
Answer:Total Value Locked (TVL)
Question 3 of 3
Which of the following factors might indicate the potential centralization risk of a project?
Answer:High percentage on project owner holding
(Таск CertiK Ventures)
Question 1 of 2
Which is not part of CertiK Ventures’ current portfolio?
Answer:Shiba Inu
Question 2 of 2
What is CertiK Ventures’ Vision?
Answer: Foster the growth of security-first projects
(Таск Bot-Driven Wash Trading in Exit Scams)
Question 1 of 3
True or False: Scammers use Tornado Cash to withdraw funds for creating scam tokens.
Answer:True
Question 2 of 3
Which platform do scammers use to distribute tokens among multiple addresses? (Select all that apply)
Answer: 1-4
Question 3 of 3
What might trigger social bots to broadcast posts on scammer tokens? (Select all that apply)
Answer: 1-2-3
(Таск Sonne Finance Incident Analysis)
Question 1 of 2
True or False: The precision loss vulnerability in CompoundV2 forks was first discovered in April 2023
Answer: True
Question 2 of 2
What was the total amount lost in the Sonne Finance exploit?
Answer: $20 million
(Таск Advanced Formal Verification of ZK Proofs)
Question 1 of 2
Which of the following best describes a Zero Knowledge Proof (ZKP)?
Answer: A way to verify the correctness of a computation without revealing its details.
Question 2 of 2
True or False: The Load8 data injection bug in zkWasm is caused by improper tracking of call and return instructions, allowing hackers to inject fake returns and manipulate the execution sequence.
Answer: False
(Таск zkSwap Finance | DeFi)
Question 1 of 3
What model does zkSwap Finance use to reward users?
Answer:Swap to Earn
Question 2 of 3
How many files did CertiK audit of zkSwap Finance in December 2023?
Answer: 6
Question 3 of 3
zkSwap Finance’s team is fully anonymous and unverified.
Answer: False - The team has been KYC verified by CertiK
(Таск Security Rating for Pre-Launch Projects)
Question 1 of 3
Which of the following categories is not included in the pre-launch project rating?
Answer: Market Stability
Question 2 of 3
Which of the Pre-Launch Stages represents the phase nearing a new market launch?
Answer: Stage 2
Question 3 of 3
Which of the following factors might boost the project’s pre-launch stage status closer to a new launch?
Answer: All of the above
(Таск Stay Vigilant on Browser Plugins)
Question 1 of 2
Which of the following is NOT considered a good security practice when using plugins?
Answer: Using plugins promoted by users on social platforms
Question 2 of 2
How do scammers carry out plugin attacks?
Answer: 1-2-3
(Таск How AI is Transforming KYC for Crypto Project Teams)
Question 1 of 2
What is a primary benefit of using AI in identity verification for KYC processes?
Answer: Increased precision and speed in verifying identities
Question 2 of 2
CertiK uses AI to enhance its background check process for its CertiK KYC badge.
Answer: True
(Таск Intro to Airdrop Scams)
Question 1 of 2
Legitimate airdrops require you to provide your private key.
Answer: False - projects never ask for such information.
Question 2 of 2
Which is a common red flag of an airdrop scam?
Answer: 1-2-3
(Таск Common Web3 Phishing Methods)
Question 1 of 2
To prevent wallet phishing attacks, verify the data and understand the transaction before signing.
Answer:True
Question 2 of 2
You should always sign airdrops, even if the project team is unresponsive.
Answer: False
(Таск Edu3Labs | The Future of Education)
Question 1 of 3
What are the 3 key areas Edu3Labs focuses on?
Answer: 1-2-4
Question 2 of 3
What KYC Badge level Edu3Labs achieved from CertiK?
Answer:Gold
Question 3 of 3
Which exchanges users can trade NFE?
Answer: 1-3
(Таск Core DAO | Infrastructure)
Question 1 of 2
Core DAO combines Delegated Proof of Work (DPoW) and Delegated Proof of Stake (DPoS) in its consensus mechanism.
Answer:True
Question 2 of 2
What ensures the scalability and security of Core DAO's blockchain?
Answer: Satoshi Plus consensus mechanism
(Таск Understanding the Impact of FIT21 on Crypto Compliance)
Question 1 of 2
FIT21 distinguishes between digital assets considered as securities, commodities, and other forms of digital property.
Answer: True
Question 2 of 2
What is one of the key goals of FIT21 for the U.S. blockchain and cryptocurrency sectors?
Answer: To foster innovation and growth
(Таск Identifying and Avoiding Phishing Scams in X Replies)
Question 1 of 3
Which of the following statements are correct?
Answer: 1-4
Question 2 of 3
In the MANEKI incident, what deceptive methods did the scammer use to trick users?
Answer: 1-3-4
Question 3 of 3
Which of the following is NOT true about the End of Thread practice?
Answer: Users could always trust messages prior to the End of Thread
(Таск Importance of Bug Bounty Programs in Web3)
Question 1 of 3
Bug bounty programs in Web3 can offer rewards in the form of tokens and cash.
Answer: True
Question 2 of 3
What is a key benefit of bug bounty programs for Web3 projects?
Answer:Use open source expertise for security
Question 3 of 3
Which projects have published their bug bounty programs on Skynet?
Answer: 1-2-3-4
(Таск RWA Security and Leaderboard)
Question 1 of 2
What is a critical step in ensuring the security of tokenized real-world assets?
Answer: Conducting regular smart contract audits
Question 2 of 2
True or False: Compliance with AML and KYC regulations is unnecessary for tokenized RWAs.
Answer:False
(Таск Arbitrum | Layer 2)
Question 1 of 2
Who were the original developers of Arbitrum?
Answer: Offchain Labs
Question 2 of 2
Does Arbitrum run a Bug Bounty program? If so, how much?
Answer: Yes - $2,000,000
(Таск SkyKnight)
Question 1 of 3
What is the primary purpose of SkyKnight?
Answer: To offer a fast and detailed security assessment tool for memecoins
Question 2 of 3
What are the key features of SkyKnight?
Answer: Deep analysis of smart contract code and comprehensive reporting
Question 3 of 3
Who can benefit from using SkyKnight?
Answer: Investors and developers
(Таск SkyInsights: Crypto Compliance)
Question 1 of 3
What is the primary objective of SkyInsights for Crypto AML and Compliance?
Answer:To identify and analyze suspicious activities in cryptocurrency transactions
Question 2 of 3
Which regulatory body in the USA registers all Money Services Businesses dealing in Convertible Virtual Currency?
Answer:FinCEN
Question 3 of 3
Which of the following are key features of SkyInsights? (Select all that apply)
Answer: 1-2-4
(Таск Diamante Blockchain | Infrastructure)
Question 1 of 3
What did the April 2024 security audit conducted by CertiK find about Diamante Blockchain's smart contracts?
Answer: No Medium, Major, or Critical issues
Question 2 of 3
What does the Gold KYC Badge signify in the context of Diamante Blockchain's team?
Answer: The team has been comprehensively verified, demonstrating high transparency
Question 3 of 3
What applications are supported by Diamante Blockchain?
Answer: PayCircle and CreditCircle
(Таск OKX and CertiK Fast Pass Program)
Question 1 of 2
What role does CertiK play in the Fast Pass Program?
Answer: Providing rigorous security audits for projects
Question 2 of 2
How can users benefit from the Fast Pass Program?
Answer: By receiving regular updates and detailed security reports
(Таск PAW Chain | Ecosystem)
Question 1 of 3
How many signatures are required for funds to be moved from PAW Chain’s Treasury multisig wallet?
Answer: 6
Question 2 of 3
What was the primary purpose of the CertiK KYC verification for the PAW Chain team?
Answer: To ensure team transparency and reduce risk
Question 3 of 3
What is the function of PAW Aggregator in the PAW Chain ecosystem?
Answer:Consolidates liquidity across different conditions to offer the best swap rates.
(Таск Evaluating Cryptocurrency News Sources)
Question 1 of 2
Community sources are inherently more trustworthy than those from professional sources.
Answer: True
Question 2 of 2
What should you check to evaluate the reliability of a news source?
Answer: 1-2-3-4
(Таск Trinique | RAT )
Question 1 of 3
What is the name for Trinique utility token?
Answer: TNQ
Question 2 of 3
The TNQ token derives its value from active user base, token transaction volume, total value locked, and the performance of the asset classes.
Answer: True
Question 3 of 3
Which KYC verification badge did Trinique's team receive from CertiK?
Answer: Gold
(Таск Intro to Crypto Drainers )
Question 1 of 2
A crypto drainer can access your wallet through
Answer: All above
Question 2 of 2
True or False: To protect against crypto drainers, it is recommended to use hardware wallets.
Answer: True
(Таск Normie Incident Analysis)
Question 1 of 2
What measure could likely have prevented NORMIE’s security incident?
Answer: A Smart Contract Audit
Question 2 of 2
What was the initial vulnerability in the NORMIE contract?
Answer: Allowing any address receiving a specific number of tokens to become a premarket_user
(Таск SIM Swap Attacks )
Question 1 of 2
How can an attacker obtain your personal information? (Select all that apply)
Answer: 1-3
Question 2 of 2
What is a common method to protect against SIM swap attacks?
Answer: Use authentication apps like Okta or Authy.
(Таск Basics of Hackathons )
Question 1 of 2
Hackathons are places where white hat hackers receive rewards from bug counties
Answer: False
Question 2 of 2
Competitive hackathons usually competitions between:
Answer: Small Teams
(Тасk Mint Club | Build Your Bonding Curve)
Question 1 of 3
What type of assets can be created using Mint Club's platform?
Answer: ERC20 tokens and ERC1155 NFTs
Question 2 of 3
Which best describes the purpose of the MINT token on Mint Club?
Answer: Base token for functionality and bonding curves
Question 3 of 3
What recognition did Mint Club's core team receive after completing KYC verification by CertiK?
Answer: Gold badge
Update july 9
(Тасk Hack3d Report Q2 H1 2024 - Part 1: Overview and Key Highlights)
Question 1 of 2
Which type of attack was the most costly in Q2 2024?
Answer:Phishing
Question 2 of 2
What was the total financial loss due to security incidents in H1 2024?
Answer: $1.19 billion
(Тасk Protecting Yourself from Discord Scams)
Question 1 of 2
What tactic do scammers often use on Discord to exploit NFT investors?
Answer: Posting fake offers for free mints or airdrops to exploit FOMO (Fear Of Missing Out)
Question 2 of 2
What should you do if you suspect your Discord account has been compromised?
Answer:Reset your password as soon as possible and ensure 2FA is enabled
Update july 11
(Тасk Hack3d Report Q2 H1 2024 - Part 2: Insights and Future Security Enhancements)
Question 1 of 2
What critical lesson was learned from the phishing attacks on DMM Bitcoin and 0x1e22?
Answer: The need for user education and enhanced verification processes
Question 2 of 2
What is a crucial step to prevent address poisoning attacks?
Answer: Meticulously verifying wallet addresses before transactions
Update july 12
(Тасk Mint Club | Build Your Bonding Curve)
Question 1 of 3
What type of assets can be created using Mint Club's platform?
Answer: ERC20 tokens and ERC1155 NFTs
Question 2 of 4
What’s the creator benefit of using Mint Club's Creator Royalties feature?
Answer: It lets creators easily set royalties from 0% to 50% on their assets.
Question 3 of 4
What’s the creator benefit of using Mint Club's Airdrop tool?
Answer: It simplifies the airdrop process with Public and Private options.
Question 4 of 4
What’s the creator benefit of using Mint Club's Bulksender tool?
Answer: It allows creators to distribute tokens or NFTs on over 12 networks.
Update july 13
(Тасk The Memecoin Markets of Springfield)
Question 1 of 3
Newly launched coins without any prior history/backing is susceptible to rugpulling.
Answer: True
Question 2 of 3
As an inexperienced crypto trader, you should trade heavily in newly launched coins as it consistently returns a profit.
Answer: False
Question 3 of 3
Which address acted as the central fund collection hub for the rugpullers?
Answer: Chief Wiggum
(Тасk Proof of Work versus Proof of Stake)
Question 1 of 3
Which consensus mechanism is used by Bitcoin?
Answer: Proof of Work
Question 2 of 3
Which is an advantage to using Proof of Stake?
Answer: It saves massive amounts of energy
Question 3 of 3
What is an advantage of using Proof of Work?
Answer : It has a high bar of entry, making it hard for attackers to manipulate
(Тасk HanChain | Transforming Music Copyright)
Question 1 of 3
What services does HanChain provide to enhance fan engagement?
Answer: MusiKhan, NFT-PLAY, AdKhan, and staking options
Question 2 of 3
How has HanChain ensured security for its platform and team?
Answer: Top 10% security score, Certik's KYC verification, and ISO27001 certification
Question 3 of 3
What benefits does HanChain's decentralized copyright holder identity verification provide to artists?
Answer: Copyright protection and fair compensation through royalties
Update july 19
(Тасk OpenGPU | Harnessing Decentralized GPU Computing)
Question 1 of 4
What does OpenGPU leverage to support AI and blockchain applications?
Answer: Decentralized GPU computing
Question 2 of 4
How many operations per second can OpenGPU support?
Answer: 5000
Question 3 of 4
What is the purpose of OpenGPU Devnet?
Answer: To test and innovate with advanced tools
Question 4 of 4
How can users monetize their idle GPU resources on OpenGPU?
Answer: By joining the decentralized computing network
(Тасk Ordinals and the BRC-20 Standard)
Question 1 of 2
What is the BRC-20 token standard primarily used for on the Bitcoin network?
Answer: Token creation and transfer
Question 2 of 2
The BRC-20 token standard relies on JSON file inscriptions for its operations.
Answer: True
Тасk Security Score Impacts with OKX)
Question 1 of 2
What is the main purpose of integrating Skynet's Security Score with third-party platforms?
Answer: To increase security awareness
Question 2 of 2
Which feature is available for OKX Wallet users regarding Skynet's Security Score?
Answer: Overall security score and subcategory scores
Update july 26
(Тасk Top Performing Cryptocurrencies of H1 2024)
Question 1 of 2
What was the purpose of the merger between SingularityNET, Fetch.ai, and Ocean Protocol?
Answer: To form a decentralized AI alliance
Question 2 of 2
Which token saw significant growth due to the launch of the TokenFi platform?
Answer: FLOKI
(Тасk WazirX Hack Incident Analysis)
Question 1 of 3
How did attackers exploit WazirX?
Answer: Compromised private key in a multisig wallet
Question 2 of 3
What was WazirX's immediate response to the hack?
Answer: Paused all trading and withdrawals
Question 3 of 3
How much is WazirX offering as a bounty for the recovery of stolen funds?
Answer: 10% of the total amount
(Тасk Mintlayer | Build on Bitcoin)
Question 1 of 4
What is the primary function of Mintlayer's blockchain architecture?
Answer: To improve direct token interoperability with Bitcoin
Question 2 of 4
How does Mintlayer enhance decentralization?
Answer: By providing a built-in DEX for P2P transfers
Question 3 of 4
What types of tokens does Mintlayer support?
Answer: Both fungible and non-fungible tokens
Question 4 of 4
What is the purpose of Mintlayer's staking protocol?
Answer: To enable users to participate in the block signer auction and earn rewards
(Тасk Patex | Latin American Blockchain Ecosystems)
Question 1 of 4
What is the main focus of the Patex ecosystem?
Answer: A comprehensive solution for the LATAM region
Question 2 of 4
What is the primary function of the Patex Network?
Answer:To solve scalability issues, increase transaction speeds, and reduce fees
Question 3 of 4
What is the role of the PATEX token in the Patex Ecosystem?
Answer: It serves as the main currency for transactions
Question 4 of 4
How does the Bug Bounty Program help Patex?
Answer: By identifying and fixing security vulnerabilities
Update Aug 11
Apple Recognizes CertiK
How many times has Apple publicly thanked CertiK?
Answer: 5
CVE #1 could have enabled hackers to do which of the following?
Answer: Identify the structure of kernel memory
How did Apple address CVE #2?
Answer: Improving buffer overflow protection
CertiK's Journey to Samsung's Security Hall of Fame
What did CertiK's Skyfall team achieve in 2023?
Answer: Secured a top five place in Samsung's Mobile Security Hall of Fame
How many vulnerabilities did Skyfall discover in the Samsung Blockchain Keystore?
Answer: B
What types of vulnerabilities were found in the Samsung Blockchain Keystore?
Answer: Critical and Major vulnerabilities
Solidus AI Tech | High-Performance Computing
What security measures has Solidus AI Tech taken?
Answer: 1,2,4
What can users access through the GPU Marketplace?
Answer: High-performance computing power
What is the primary function of the $AITECH token within the Solidus AI Tech ecosystem?
Answer: Payment for AI and GPU services
How many core team members are verified by CertiK?
Answer: 5
What is the annual revenue generated from fake hiring schemes?
Answer: $600 million
How many North Koreans are directed to infiltrate the tech industry according to the UN?
Answer: 4,000
What is one red flag during video interviews that can indicate a fake applicant?
Answer: Refusing to turn on the camera
What is a Sybil attack?
Answer: An attack where one person creates multiple identities to take over a network.
What can a successful Sybil attack lead to in a blockchain network?
Answer: All of the above.
How do consensus algorithms help defend against Sybil attacks?
Answer: By making it impractical and costly for attackers to succeed.
How can you prevent hardware keyloggers?
Answer: Regularly check USB ports for unfamiliar devices
What is a common use of software keyloggers by cybercriminals?
Answer: Stealing sensitive information
What type of communication platforms should be used for a war room?
Answer: Secure messaging apps
Why are drills and simulations important for a security war room?* Choose only one answer
Answer: They identify weaknesses and improve team coordination
What should be included in a post-mortem analysis?
Answer: All of the above
What does BGP hijacking involve?
Answer: Diverting traffic by announcing unauthorized IP address blocks
What are some key measures to prevent BGP hijacking?
Answer: 2-3-4
What was the result of the KLAYswap BGP hijacking attack?
Answer: Losses of $1.9 million
How can users access the Skynet Pulse feature?
Answer: By clicking on the heart icon at the top of the Skynet homepage
What information is provided next to each Pulse notification?
Answer: The project’s security score and a link to their Skynet profile
Update Aug 24
(Тасk Evaluating Security with Skynet Token Scan)
Question 1 of 3
What does Skynet Token Scan primarily analyze?
Answer: Smart contract code
Question 2 of 3
What type of tokens does Skynet Token Scan currently support?
Answer: Solana
Question 3 of 3
What does the Skynet Token Scan report categorize findings by?
Answer: Severity level
(Тасk Script Network | Open Source Video Protocol)
Question 1 of 4
What is Script Network?
Answer: A Layer 1 open-source live TV platform, protocol, and storage network
Question 2 of 4
What is the purpose of $SCPT in the Script Network ecosystem?
Answer: Governance and staking
Question 3 of 4
How does Script Network ensure security and trust within its ecosystem?
Answer: By completing security assessments, maintaining an active KYC verification, and a bug bounty program
Question 4 of 4
What can users do with Script TV?
Answer: Watch multiple channels 24/7/365 and earn rewards
(Тасk UtopiaSphere Incident Analysis)
Question 1 of 2
What was the amount exploited from UtopiaSphere on 21 July 2024?
Answer: $521K
Question 2 of 2
What mechanism was exploited in the UtopiaSphere incident?
Answer: swapBurn()
(Тасk Cold Wallets)
Question 1 of 3
When should you consider using a cold wallet?
Answer: Storing your crypto assets offline for safe and long-term storage
Question 2 of 3
What are the different types of cold wallets?
Answer: 1-2-4
Question 3 of 3
What should you do when purchasing a hardware wallet?
Answer: 1-4
(Тасk How to Create and Maintain Secure Passwords)
Question 1 of 3
Why should you avoid reusing passwords?
Answer: To prevent hackers from accessing multiple accounts
Question 2 of 3
What makes a password complex?
Answer: A mix of upper and lower case letters, numbers, and special characters
Question 3 of 3
How often should you change your passwords?
Answer: Regularly to prevent expired passwords from being useful to hackers
(Тасk Vanity Address and Address Poisoning)
Question 1 of 3
What is the main risk of address poisoning?
Answer: Sending funds to a scam address
Question 2 of 3
How can you protect yourself from address poisoning?* Choose only one answer
Answer: Always double-check the entire address
Question 3 of 3
Vanity addresses are impossible to detect and there are no tools available to help users identify them
Answer: False
(Таск Introduction to Account Abstraction)
Question 1 of 2
What is NOT a benefit of Account Abstraction?
Answer: Allowing for transactions to be conducted fully anonymously
Question 2 of 2
What is a real-world example where Ethereum’s account abstraction can be useful?
Answer: All of the above
(Тасk Mastering Bridge Tracing)
Question 1 of 3
What is the primary purpose of a Chain ID in bridge tracing?
Answer: To uniquely identify a specific blockchain network
Question 2 of 3
What technique can be used to trace transactions when explicit details are not available?
Answer: Timing Analysis
Question 3 of 3
What does decoding the input data of a transaction help you discover?
Answer: The destination chain and recipient address
(Тасk Navigating DAO Governance and the Compound DAO Incident)
Question 1 of 3
What was the primary controversy in the Golden Boys' proposal to Compound DAO?
Answer: The funds would be stored in a vault controlled by them
Question 2 of 3
What legal structure is recommended for DAOs to protect members from personal liability?
Answer: Limited Liability Corporation (LLC)
Question 3 of 3
What method is suggested to improve governance participation in DAOs?
Answer: Implementing weekend-free voting and experimenting with AI proxy voting
Update Aug 29
(Тасk Understanding and Mitigating 51% Attacks)
Question 1 of 3
What happens in a 51% attack?
Answer: An attacker gains control of more than half of the network’s computational power
Question 2 of 3
Which of the following is a potential consequence of a 51% attack?
Answer: Double-spending of coins
Question 3 of 3
How can blockchain networks reduce the risk of a 51% attack?
Answer: By distributing mining power widely and adjusting mining difficulty
(Тасk How Binance Clawed Back $73M in Stolen Funds)
Question 1 of 3
What percentage of the $73 million recovered by Binance in 2024 was stolen through hacks, exploits, and thefts?
Answer:80%
Question 2 of 3
How much did Binance recover in stolen funds during the entire year of 2023?
Answer: $55 million
Question 3 of 3
What was a key factor contributing to the increase in stolen crypto assets in 2024?
Answer: Increased market growth and volatility
Update SEP 7
(Тасk Protecting Your PostgreSQL Database from Cryptojacking)
Question 1 of 3
PG_MEM targets PostgreSQL databases with strong passwords*
Answer: False
Question 2 of 3
What does PG_MEM do once it infiltrates a PostgreSQL database?
Answer: Creates a new user account with high privileges
Question 3 of 3
What is the primary method of defense against PG_MEM?
Answer: Using strong, unique passwords and regular system updates
(Тасk SOC 2 Compliance for Crypto Companies)
Question 1 of 3
SOC 2 compliance is a one-time certification that does not require ongoing efforts
Answer: False
Question 2 of 3
What are the key areas covered by SOC 2 compliance?
Answer: Security, Availability, Processing Integrity, Confidentiality, and Privacy
Question 3 of 3
Why is SOC 2 compliance important for crypto companies?
Answer: It helps demonstrate a commitment to data security and builds trust with users
(Тасk Stay Ahead with Skynet's Intelligent Calendar)
Question 1 of 2
What is one of the key event types tracked by Skynet’s Smart Calendar?
Answer: Airdrops
Question 2 of 2
How can the Smart Calendar help you in the Web3 space?
Answer: It tracks important Web3 events such as token unlocking and exchange listings
(Тасk Understanding AI's Role in Enhancing Web3 Security)
Question 1 of 3
What is a key benefit of decentralizing data storage with AI?
Answer: It enhances transparency and security.
Question 2 of 3
Why are proprietary AI models used in sensitive fields like healthcare?
Answer: They offer data security.
Question 3 of 3
AI can fully address all complex security challenges in blockchain.* Choose only one answer
Answer: False
Update OCT 27
Which messaging app offers full end-to-end encryption for all communication?
Answer: Signal
Which app is currently exploring deeper crypto integration through the TON project?
Answer: Telegram
What is the primary purpose of the DeRec Alliance?
Answer: Standardize secrets management and recovery
How does DeRec protect user secrets?
Answer: By using encrypted fragments held by multiple helpers
Which feature makes DeRec different from ERC-4337?
Answer: Support for on-chain and off-chain secrets
What has driven the surge in AI memecoin popularity in 2024?
Answer: Increased retail trading and viral hype
Which blockchain has seen a 39% rise in trading volume due to AI memecoins?
Answer: Solana
What is one reason retail traders prefer memecoins over venture-backed tokens?
Answer: Memecoins are launched with all supply unlocked
Which form is used to report capital gains or losses from crypto transactions?
Answer: Form 8949
You only need to report crypto income if it exceeds $600.
Answer: False
What is the primary distinction between short-term and long-term capital gains?
Answer: The duration the asset was held
What percentage of blockchain financial losses are caused by private key leaks?
Answer: 50%
How does CertiK ensure its audit reports are transparent?
Answer: By making them public on the Skynet platform
What is one key area of focus for improving Web3 security?
Answer: Decentralizing authentication and data storage
What is the primary target of the SpyAgent malware?
Answer: Mnemonic recovery phrases
Which method does SpyAgent use to spread malware?
Answer: Phishing campaigns
What is one common tactic used by North Korean scammers in crypto schemes?
Answer: Impersonating well-known individuals
What should you do if you receive an unsolicited job offer related to cryptocurrency?
Answer: Verify the offer through official channels
How can you protect yourself from malware distributed through social engineering schemes?
Answer: Use security software and verify sources
What is a primary security challenge in Web3 Dapps?
Answer: Integration of Web2 vulnerabilities and blockchain-specific issues.
What type of Dapp architecture includes both server-side APIs and blockchain interactions?
Answer: Full-Scale Dapp
How can an attacker exploit client-side vulnerabilities in a Web3 Dapp?
Answer: By injecting malicious JavaScript to initiate unauthorized transactions
What was the name of the vulnerability discovered in the Apple Vision Pro?
Answer: GAZEploit
What accuracy did CertiK researchers achieve in reconstructing messages from eye-tracking data?
Answer: 92%
How many times has CertiK been publicly acknowledged by Apple?
Answer: Six times
How much Bitcoin was stolen in the scam?
Answer: 4,100 BTC
What method did the scammers use to steal the victim’s Bitcoin?
Answer: Posing as Google and Gemini support
What was the most costly attack vector in Q3 2024?
Answer: Phishing
How can you protect yourself from phishing attacks?
Answer: Double-check URLs and email addresses for legitimacy
How much did the Bitcoin whale lose in the phishing attack?
Answer: $238 million
What caused the WazirX hack?
Answer: Private key theft
What is peeling in cryptocurrency?
Answer: A laundering technique dividing a large amount into small transactions
What is the goal of peeling?
Answer: To hide funds through a series of small transactions
What does clipper malware do?
Answer: Replaces copied crypto wallet addresses with hacker-controlled addresses
Which apps are targeted by repackaged versions of malware?
Answer: Messaging apps like WhatsApp and Telegram
What is one way to protect yourself from clipper malware?
Answer: Verify wallet addresses before sending funds
How did the attackers breach Radiant Capital?
Answer: By compromising developer hardware wallets with malware
What security change did Radiant make to its multisig wallets?
Answer: Reduced signers to seven, with four required for approval
What delay is now enforced for contract updates and ownership transfers?
Answer: 72 hours
What is the purpose of wash trading?
Answer: To create fake trading activity.
What happens in a pump-and-dump scheme?
Answer: Tokens are artificially inflated and then sold off
What does DePIN stand for?
Answer: Decentralized Physical Infrastructure Network
Which project is an example of DePIN in data storage?
Answer: Filecoin
Which feature in OKX Wallet allows users to swap tokens across multiple networks?
Answer: DEX & Bridge Aggregator
What does the OKX Wallet dashboard provide to users?
Answer: Overview of digital assets, portfolio performance, and transaction history
What unique advantage does the WEXO Wallet provide to users?
Answer: Allows conversion between digital and fiat currencies within the wallet
What feature of WEXO specifically targets businesses looking to integrate cryptocurrency payments?
Answer: Bitcoin Lightning POS
How does WEXO enhance its ecosystem participation through its native token?
Answer: By allowing access to premium features and reduced transaction fees within the platform
What distinguishes WEXO’s security approach in the cryptocurrency space?
Answer: Regular security audits linked to on-chain verified smart contracts
What makes Polymarket different from traditional betting platforms?
Answer: It operates without the need for intermediaries, using blockchain technology for decentralized
control.
Which of the following best describes how prices are set for shares in Polymarket?
Answer: Prices fluctuate based on the collective trading activity and predictions of users.
What incentive does Polymarket offer to enhance the security of its platform?
Answer: A bug bounty program with rewards of up to $1,000,000 for identifying security vulnerabilities
What is one of the main features of Phantom Wallet?
Answer: Ability to store and manage Solana tokens and NFTs
You can swap tokens within Phantom Wallet without using an external exchange.
Answer: True
What does Phantom’s Bug Bounty Program offer?
Answer: Up to $50,000 in rewards for reporting security vulnerabilities
What is the primary function of MetaMask?
Answer: Serving as an Ethereum wallet and gateway to DApps.
How does MetaMask help with security?
Answer: By providing a Secret Recovery Phrase for wallet recovery.
What should users be cautious of when using MetaMask with DApps?
Answer: Connecting to unverified or suspicious DApps.
What year did Satoshi release the Bitcoin whitepaper?
Answer: 2008
When did Satoshi stop communicating?
Answer: 2011
How many Bitcoin is Satoshi estimated to own?
Answer: 1 million BTC
What is ransomware?
Answer: A type of malware that locks data and demands payment to unlock it.
How many attacks has DHS stopped since 2021?
Answer: 537
What is a key challenge for DHS when stopping ransomware attacks?
Answer: Gathering evidence to prosecute hackers.
How much is CertiK Ventures investing?
Answer: $45 Million
Which tools did CertiK introduce for free?
Answer: 1-2
How much in assets has CertiK protected?
Answer: $360 Billion
What is the primary purpose of Skynet's Wallet Scan?
Answer: To identify high-risk approvals and potential threats
What does Wallet Scan provide after analyzing a wallet address?
Answer: Risky approvals and value at risk
Update DEC 12
Is Truth Terminal the Creator of the Meme Token GOAT?
Answer: False
How Much Truth Terminal Received from Marc Andreessen?
Answer: 50.000 In BTC
What enables quantum computers to solve problems faster than classical computers?
Answer: They use qubits that can represent multiple states at once
What makes ECDSA essential to Bitcoin’s security?
Answer: It ensures only valid users can sign transactions
Why are quantum computers not an immediate threat to blockchains?
Answer: Current quantum computers lack the number of qubits required to break blockchain encryption
What does a hybrid storage model accomplish?
Answer: It separates sensitive data into off-chain systems while keeping audit logs on-chain
How do Zero-Knowledge Proofs help with compliance?
Answer: By verifying data validity without exposing underlying information
Why are weak encryption algorithms used in some desktop wallets a security issue?
Answer: They are vulnerable to brute-force attacks
What is a key benefit of using an MPC wallet for digital asset security?
Answer: It divides private keys across multiple participants, reducing single points of failure
What caused the vulnerability in Polter Finance’s system?
Answer: Price oracle relying solely on spot prices.
How did the attacker inflate the price of BOO?
Answer: By manipulating liquidity pairs via flashloans
What is a key lesson from the Polter Finance exploit?
Answer: Validate oracle prices with historical data.
What is Optimism?
Answer: A Layer 2 scaling solution for Ethereum
How does Optimism maintain security while processing transactions off-chain?
Answer: By posting transaction data to Ethereum
What ensures that invalid transactions on Optimism are corrected?
Answer: Fraud proofs
What is a key feature of Solana's account-based model?
Answer: Predefined accounts for program execution
What is a best practice for Cross-Program Invocations?
Answer: Use CPIs with trusted programs only
What was the root cause of the Clipper DEX exploit?
Answer: Vulnerability in the withdrawal function
What action did Clipper take to prevent further exploitation?
Answer: Paused swaps and deposits, requiring mixed-asset withdrawals
The Clipper exploit affected all liquidity pools on the platform.
Answer: False
What does a spot Ethereum ETF hold?
Answer: Ether tokens
Which company manages ETHA?
Answer: BlackRock
Spot Ethereum ETFs track the real-time price of ether by holding the asset directly.
Answer: True
What makes Pump.fun unique in the meme coin market?
Answer: It has a live streaming feature for promoting tokens
Pump.fun charges users to create tokens.
Answer: Solana
What is a key feature of AI memecoins?
Answer: Viral meme-based marketing
Which AI memecoin gained attention through the "Goatse Gospels"?
Answer: Goatseus Maximus
What is wash trading?
Answer: Buying and selling an asset to create fake trading volume
What does spoofing involve?
Answer: Placing large fake orders to manipulate prices
What is a key characteristic of a pump and dump scheme?
Answer: Coordinated buying followed by mass selling
What was the total loss resulting from the CryptoBottle incidents in October 2024?
Answer: $527,000
What vulnerability in the swap() method allowed the October 24 exploit to succeed?
Answer: Disabled balance check
What function did the attacker use to acquire large amounts of NAS tokens with minimal USDT?
Answer: Invest
......يتبع
بالتوفيق للجميع
تابع التحديثات على قناة التلغرام
قناة الدردشة لما تدخل اكبس على إلغاء الكتم عني عشان تقدر تكتب