CertiK

CertiK

CertiK is a leading blockchain and Web3 security auditor that provides smart contract auditing and a comprehensive suite of security tools for the crypto industry. Founded in late 2017 by professors from Columbia University and Yale University, CertiK has grown into the largest Web3 security service provider with headquarters in New York. The company’s services help blockchain projects, exchanges, and enterprises strengthen their security, and CertiK is trusted by major industry players worldwide (e.g. Binance, OKX, Polygon, etc.) to audit and monitor their systems.
New York, USA
Employees: 200

Description

CertiK specializes in blockchain cybersecurity, leveraging formal verification techniques and AI technology to secure smart contracts and blockchain protocols across the Web3 ecosystem. The company offers end-to-end security solutions including smart contract and blockchain audits, on-chain monitoring (through its Skynet platform), penetration testing, compliance/AML tools, and advisory services, covering the entire project lifecycle from development to post-deployment. One of the fastest-growing firms in the crypto security sector, CertiK has served nearly 4,000 clients and helped secure over $360 billion worth of digital assets by detecting tens of thousands of vulnerabilities in code. Its clients range from DeFi protocols and layer-1 blockchains to exchanges and wallets – notable examples include projects like Aave, Polygon, Binance Smart Chain, Terra, and more. Backed by top investors such as Sequoia Capital, Tiger Global, Coatue, and Goldman Sachs, CertiK has established itself as a market leader in blockchain security. The company’s mission is to “secure the Web3 world,” applying cutting-edge academic research to real-world blockchain applications to improve safety and trust in the crypto ecosystem.

Grant Funding

VC Funding

None
2018
2020
2021

$0

$72M

Technology & Skills

Uncover the hard and soft skills and tools employed by the organization, and gain insight into the technologies that drive their success
REVERSE ENGINEERING
VIRTUAL MACHINE
SANDBOX
SYSTEM SOFTWARE
VULNERABILITY DETECTION
MULTILINGUALISM
GAMEFI
TOKEN ECONOMY
LAYER1
LAYER2
ECOSYSTEM GROWTH
LAUNCHPAD
STARK
BULLETPROOF
CIRCUIT DESIGN
ELLIPTIC CURVE CRYPTOGRAPHY
ZK CIRCUIT
ZK-STARK
SECURITY TOOLING
COMPILER
LLVM
SEMANTIC ANALYSIS
PARSING
LEXICAL ANALYSIS
AST
TYPE SYSTEM
SMT SOLVER
SPREADSHEET
SHIPPING
INVENTORY
RECEIVING
INVENTORY MANAGEMENT
SHIPMENT
HELP DESK
SLACK
IT LOGISTICS
DEVICE TRACKING
THREAT MODELING
SECURITY AUDITING
INTEGER OVERFLOW
PROTOCOL-ANALYSIS
PROPERTY-BASED TESTING
L3
SOLIDITY
DAPP
CODE REVIEW
L1
L2
WEB3 PROTOCOL
GAS ANALYSIS
ATTACK SURFACE ANALYSIS
REENTRANCY
SANDWICH ATTACK
OVERFLOW
UNDERFLOW
NODE
COSMOS SDK
MEMPOOL
COMETBFT
HYPERLEDGER FABRIC
BESU
BASH
VALIDATOR
GETH
WEB SECURITY
NETWORK PENETRATION
MOBILE APPLICATION
SOURCE CODE REVIEW
CRYPTOGRAPHY
TOOLING
WEB APPLICATION
JAVASCRIPT
TYPESCRIPT
AWS
AZURE
GCP
PYTHON
REPORTING
RESEARCH
WALLET
BROWSER EXTENSION
CLOUD SECURITY
SMART CONTRACT
PENETRATION TESTING
CLIENT SUPPORT
OSINT
IDENTITY VERIFICATION
TWITTER
COMPLIANCE
COMMUNICATION
DOCUMENTATION
RISK ASSESSMENT
KYC
INVESTIGATION
AML
CFT
INTERVIEWING
CUSTOMER SERVICE
SECURITY RESEARCH
COSMOS
SECURITY ANALYSIS
GO
MATHEMATICS
RUST
BLOCKCHAIN PROTOCOL
DEFI
AUDIT
BLOCKCHAIN
ON-CHAIN ANALYSIS
CLINE
WINDSURF
AGENT
AI
LLM
THREAT DETECTION
SECURITY AUDIT
CURSOR
VULNERABILITY ANALYSIS
PYTORCH
NLP
DEEP LEARNING
TENSORFLOW
AI AGENT
TRANSFORMER
MACHINE LEARNING
VULNERABILITY ASSESSMENT
STAKEHOLDER COMMUNICATION
LEAD QUALIFICATION
PIPELINE
DISCORD
TELEGRAM
SAAS
CAMPAIGN MANAGEMENT
PARTNERSHIPS
DEMONSTRATION
BUSINESS DEVELOPMENT
PRESENTATION
SALES
PRODUCT DEMO
VALUE PROPOSITION
ENTERPRISE SAAS
CRYPTO
DEMO
PARTNERSHIP
EXCEL VBA
VALUATION
DATABRICKS
DCF
STAKING
R
DATA CLEANING
BI
TABLEAU
AUTOMATION
TOKENOMICS
TIME SERIES
WACC
FCFF
VERIFICATION
WALLET INTEGRATION
FORMAL METHODS
SMT
AUTOMATED REASONING
EVM
WEB3.JS
FORMAL VERIFICATION
S3
REACT
DATA VISUALIZATION
EC2
PROGRAMMING LANGUAGE THEORY
SYMBOLIC MODEL CHECKING
SAT
ABSTRACT INTERPRETATION
DATA FLOW ANALYSIS
DEDUCTIVE VERIFICATION
CONTENT MARKETING
CONTENT LIFECYCLE
CONTENT PLANNING
TECHNICAL WRITING
EDITING
NFT
PERSONA MAPPING
CODE ANALYSIS
NODE.JS
SECURITY
C#
STATIC ANALYSIS
ALGORITHM
ATTACK MODEL
ADVERTISING
LEAD GENERATION
CRYPTOCURRENCY
PERFORMANCE REPORTING
PRODUCT DEMONSTRATION
SALES STRATEGY
KYT
SALES PIPELINE
MARKET RESEARCH
KYW
KYA
RISK AND COMPLIANCE
SMART CONTRACT RISK ASSESSMENT
COMPETITOR ANALYSIS
CLIENT RELATIONSHIP
BDR
SDR
AMA
SOCIAL
INSIGHTS
LINKEDIN
KOL
KOREAN
ENGLISH
RELATIONSHIP MANAGEMENT
DATA ANALYSIS
WEB3
CONTENT CREATION
CONTENT EDITING
COMMUNITY
CONTENT STRATEGY
USER RESEARCH
ABSTRACT ALGEBRA
HASKELL
PROGRAMMING-LANGUAGE
CI/CD
OCAML
DATA STRUCTURE
MATHEMATICAL LOGIC
AUTOMATA THEORY
MODEL CHECKING
AUTOMATED TESTING