Dedge Security

58 posts

Dedge Security banner
Dedge Security

Dedge Security

@DedgeSecurity

Digital Assets Security Posture Management for enterprises. The security function audits can't replace. Built by enterprise security veterans.

Madrid (Spain) Katılım Nisan 2023
9 Takip Edilen127 Takipçiler
Dedge Security
Dedge Security@DedgeSecurity·
Dedge is joining @areta_io's Ethereum Security Subsidy Program, alongside @cyfrin, @NethermindSec, and @OlympixSecurity. Some context on why this matters right now. We tracked 97 confirmed incidents and $802M+ in losses between January and May 2026. The recovery rate was 3.62%. Drift. Resolv. Rhea Lend. The pattern across every major incident was the same. A failure in what happened after deployment. Config drift, operational compromise, governance manipulation. None of it is visible to a one-time review. Through this program, Ethereum builders can now access Dedge's continuous security monitoring as part of their security package, from day one of deployment. An audit tells you where you stood. Dedge tells you where you stand. Apply here: ethereum.areta.market @ethereumfndn @chainlink
Dedge Security tweet media
Findlay@0xboo

2/ We've worked with each provider to curate three security packages purpose-built for Ethereum subsidy program applicants. The tools have come a long way, and we're proud to bring some of the best of them into the program for Ethereum builders. Big thanks to @cyfrin, @NethermindSec, @DedgeSecurity, and @OlympixSecurity for being a part of this program 🤝

English
2
2
3
102
Dedge Security
Dedge Security@DedgeSecurity·
Every signal in this attack was on-chain before execution day. Durable nonce accounts tied to governance signer addresses. A zero-timelock migration that replaced four of five signers. A fabricated asset seeded three weeks in advance. Full forensic breakdown: dedgesecurity.com/blog/beyond-th…
English
0
0
1
77
Dedge Security
Dedge Security@DedgeSecurity·
@trmlabs, @elliptic, and @chainalysis all attribute this independently to UNC4736. DPRK-linked. The same cluster behind Radiant Capital in 2024. $285M. Largest DeFi loss of 2026.
English
2
0
1
54
Dedge Security
Dedge Security@DedgeSecurity·
Post: "Beyond the Audit Perimeter: How Drift Protocol Lost $285M Without a Single Code Bug" $285M. Solana. April 1, 2026. Root cause: governance misconfiguration across three surfaces. Neither audit was scoped to assess any of them.
Dedge Security tweet media
English
1
3
6
197
Dedge Security
Dedge Security@DedgeSecurity·
Drift had a Security Council. It still lost $285 million. Resolv had clean audits. It still got drained through a rebalancing window nobody was watching. The basics matter. But the basics alone aren't the answer either because attackers spent six months inside Drift's operational perimeter before anyone noticed. Technically speaking, the Security Council didn't fail. Audits check the code. Nobody checks the posture. Not at deployment. Not six months later when the pre-signed transactions execute. The solution is continuous security posture management by watching the configuration, the permissions, the parameter changes, and the operational hygiene of the team, every single day. That's what's missing.
Hasu⚡️🤖@hasufl

Every Defi protocol should have: 1. Circuit breakers for deposit and withdrawals, and possibly other internal operations as well 2. Timelocks for any change 3. Security councils that can shut down protocols immediately We don't need insurance, we need to do start doing the ffcking basics correctly. It's too early for this space to drive without any training wheels. I beg you, sacrifice a tiny bit of UX to gain a lot of peace of mind. The worst possible UX is losing your user's money.

English
0
2
3
194
Dedge Security
Dedge Security@DedgeSecurity·
H1 2026: • 65 protocols. • 802M lost. • <1% recovered. Audits weren't enough. They weren't scoped to be. Today at 12 UTC, our CEO, Rubèn Jimènez Garcia, joins @rwaweek's Space on real-time token flow security with @rwa_io, @wsource4, hosted by @pauli_speaks. Join us at: linkedin.com/video/event/ur… Bring your hard questions. The format is open.
Dedge Security tweet media
English
2
3
5
132
Dedge Security
Dedge Security@DedgeSecurity·
Good thread. This is why Security Posture Management isn't optional anymore. Audits tell you your contracts were safe when they were reviewed. A few additions from an SPM lens: 1) Dependencies aren’t static, neither is your risk. If your security assumptions depend on external systems (bridges, oracles, DVNs, governance layers), then every config change they make is your risk surface. You don’t just “review” dependencies, but also continuously monitor them. 2) You are someone else’s attack surface. If downstream protocols need to monitor your multisigs and EOAs to stay safe, that’s not paranoia, that’s correct behavior. Security in DeFi is transitive. 3) Detection order needs to invert. Right now it’s: attackers → external researchers → internal teams That’s a losing model. Instead, the industry need: internal monitoring → automated alerts → external validation If the first signal comes from Twitter, it’s already too late. Monitor your privileged keys, multisigs, upgrade rights, and deps 24/7.
bartek.eth@bkiepuszewski

As more and more admin keys are compromised to drain protocols, here's your check list if you are running one: 1) Learn as much as you can about your external dependencies. Once you learn about them, monitor their setup for upgrades 24/7. It's ridiculous to rely on an audit to tell you "hey, the doors to your house are locked, we checked it on 23rd of March". Today the external token that you may depend on could be L0 4/4 DVN; tomorrow, it may be 1/1 DVN. You should get an alert of a change and react to the news 2) As you should monitor your external dependencies, anyone relying on you should monitor you - for them, you are their external dependency. They should monitor every single MultiSig that you run, every single EOA that you set up - it's potentially their liability. Once an unsafe setup is detected, they may (and frankly should) refuse to use your protocol. So make sure you don't have these freaking EOAs that you set up just for operational efficiency 3) The first people spotting your weak points will be hackers. Then, external teams. Finally, your internal ops team. You need to reverse that order 4) Don't rely on AI slop for risk analysis. This current trend, where we see dozens of "risk-mgmt dashboards that I vibe-coded over the weekend" is frankly beyond scaring and outright irresponsible. You will get beautiful-sounding report, but you will never be sure if it is correct or bullshit or something in between The above you should do on top of code audits of your protocol and impeccable internal opsec, circuit-breaker infra, and whatnot. If you think that's frankly too much or too expensive - gtfo of DeFi And if you are overwhelmed with the complexity of the task - talk to @l2beat 💕

English
1
0
4
61
Dedge Security
Dedge Security@DedgeSecurity·
On 22 March 2026, an attacker deposited $200,000 in USDC into Resolv's USR Counter contract and minted 80 million USR. The contract was executed as written. We reviewed the architecture. Three findings. Resolv had 18 audits. Point-in-time code review does not cover cloud infrastructure configuration. It does not evaluate incident response design. It does not check whether a pause function has a documented trigger threshold. These are not audit findings, but rather posture findings. If you are responsible for stablecoin, tokenisation, or privileged off-chain minting exposure: read it. Full technical breakdown of smart contract layer, infrastructure layer, and compliance layer linked below.
Dedge Security tweet media
English
1
1
3
189
Dedge Security
Dedge Security@DedgeSecurity·
Audits answer a specific question: was this code safe on this date? That is a useful question but also a narrow one. Security is a stack, not a one-time audit; you need: • Audit, • Scans, • Monitoring, • Bug bounty, • Key rotation, • Scope role, etc. It's about adopting a certain posture to minimise risk as much as possible, on all attackable surfaces. You can have the best auditors in the world, but if everyone in your company has access to the private key of the owner account in your smart contract, it will be the weak point, looking to get attacked. To build the finance of tomorrow on-chain, you need to be secure everywhere. Case in point: Resolv had 18 answers to that question. The exploit had nothing to do with the contract. A compromised AWS KMS credential gave an attacker signing authority over the minting function. The code executed exactly as designed. The security posture failed at a layer that no audit firm was ever asked to review. It's about securing the entire stack evenly.
Stacy Muur@stacy_muur

I checked the public audit trail behind some of the biggest DeFi exploits this year. Some of the main audit firms that showed up ↓ > Resolv → @MixBytes, @PashovAuditGrp, @pessimistic_io > Venus Protocol → @OpenZeppelin, @peckshield, @Quantstamp > Moonwell → @HalbornSecurity > Makina → @chain_security, @sigp_io, @osec_io > CrossCurve → @MixBytes, @SmartStateTech, @hexens > Aperture Finance → @VeridiseInc, @SecurityOak, @SolidifiedHQ These protocols had public audit coverage and still got exploited. Audited ≠ safe. They just lower risk.

English
1
2
4
367
Dedge Security
Dedge Security@DedgeSecurity·
Proud to announce Dedge has joined @INATBA_org! "Regulatory frameworks are evolving. The focus is shifting towards translating governance into resilient technical infrastructure" — Rubén Jiménez García, CEO @DedgeSecurity Our security posture management (SPM) layer embeds security controls & governance risk into the core architecture Compliance state for digital assets is evolving. Infrastructure must follow.
Dedge Security tweet media
English
0
0
2
109
Dedge Security
Dedge Security@DedgeSecurity·
Security isn't a feature. It's the foundation. Proud to be part of how @WhataLab is building enterprise Web3 infrastructure on @Hedera. Our "Security Posture Management (SPM)" platform running across the entire Hedera infrastructure stack > Continuous security analysis > Code-to-chain visibility > Risk prioritisation This is what it looks like to build it right.
Dedge Security tweet media
English
0
0
3
104
Dedge Security
Dedge Security@DedgeSecurity·
Dedge has joined @CantonFdn ecosystem! As Canton Network becomes critical infrastructure for digital asset landscape, the attack surface scales with it. Visibility doesn't come automatically. Neither does control. As a member, we're bringing "Continuous security posture" to DAML-based projects. One step at a time.🫡
Dedge Security tweet media
English
0
0
5
93
Dedge Security
Dedge Security@DedgeSecurity·
@SentoraHQ Interesting insight! Security is fragmented in web3 and unfortunately a last-minute thought leaving gaps even after a proper manual audit but it's not enough.
English
0
0
1
64
Securitize
Securitize@Securitize·
We’re partnering with STBL, Hamilton Lane, and OKX Ventures to support the launch of an RWA-backed stablecoin on X Layer. We’re bringing together institutional private credit, regulated tokenization, and programmable settlement to support the next generation of onchain financial infrastructure.
OKX Ventures@OKX_Ventures

OKX Ventures 🤝 @stbl_official STBL + partners will bring a RWA-backed stablecoin to market on X Layer. Institutional-grade assets combined with seamless onchain settlement, built for the New Money Era.

English
17
43
241
30.2K
Dedge Security
Dedge Security@DedgeSecurity·
Hi Spain’s DLT ecosystem! 🇪🇸 Excited to support @REDISBE's strategic initiative in advancing compliant, sovereign blockchain adoption (aligned with Europe and EBSI) We’re here to help ensure it scales securely :)
Dedge Security tweet media
English
2
0
4
211