CertiK outlines three crypto exploits targeting DeFi users


A report published on January 11 details the most common honeypot schemes in DeFi and how to identify them through block explorers.

Author: