The Cetus Protocol initiated a comprehensive security overhaul after the $223 million exploit, introducing real-time monitoring, enhanced risk management, deeper test coverage, and milestone-based audits.
Claim
Quotes that support claims
To strengthen its defenses, Cetus is implementing enhanced real-time monitoring, stricter risk management configurations, deeper test coverage, and more frequent, milestone-based audits, alongside committing to greater transparency through public reporting of code coverage metrics.
Going forward, we will strengthen our security posture and enhance risk controls through: 1. Leveraging tools like Blockaid for real-time monitoring to detect and respond to threats and vulnerabilities 2. Improved configurations for risk management and controlled rate-limiting of asset flows 3. Smart contract source code with higher test coverage 4. Public reporting of our code coverage metrics 5. Audits before general releases, after major code changes, and when reaching key TVL milestones
Referenced by
Protocol-level recovery and hardening measures
Crypto news
Data block