Contact
Contact Our Team
January 17, 2026
featured post

How Solana achieved 2 years uptime after launching with $3M | Matt Sorg (Solana Foundation)

Join Our Community
and Stay Up to Date

Join Sherlock on Discord

Sky's context-building approach: Six months to zero-finding audits | Deniz Yilmaz

Sky's audits consistently return zero findings. When they don't, CTO Deniz Yilmaz investigates why the internal review process failed—not just the bugs.

Apr 10, 2026

Polygon Labs' two-team security structure: where most Web3 breaches actually start | Mudit Gupta

ZK infrastructure carries more bugs than the smart contract layer — and the only thing preventing large-scale exploits is that the number of people capable of executing them is countable on two hands.

Apr 10, 2026

Web3 Security Podcast: DC Builder, Research Engineer at World Foundation

Web3 Security Podcast: DC Builder, Research Engineer at World Foundation

Feb 5, 2026

How Solana achieved 2 years uptime after launching with $3M | Matt Sorg (Solana Foundation)

Solana launched mainnet with $2-3 million in spring 2018 when typical L1s raised $100 million plus. Matt Sorg, VP of Technology at Solana Foundation, reveals how they transformed from frequent network halts to approaching two years of continuous uptime through systematic engineering, multi-client architecture, and a technically savvy validator network that independently reviews every code release.

Jan 17, 2026

Coinbase's Auditing Standards with Shashank Agrawal

Coinbase’s internal security process is designed so that it’s very rare for an external audit to reveal any high or critical issues. Shashank Agrawal, Head of Security at Base, breaks down their multi-round validation workflow, how it protects more than $7B in Base TVL, and why off-chain infrastructure receives the same scrutiny as smart contracts.

Nov 19, 2025

Ethereum Foundation's path to 10,000 TPS and Bitcoin's 51% attack risk | Justin Drake

Jack Sanford speaks with Justin Drake from the Ethereum Foundation about the security economics driving L1 infrastructure over the next decade.

Nov 5, 2025
1 / 3

Secure Your Protocol with sherlock

Sherlock delivers complete lifecycle security, from early development to protection on live code. Tell us what stage you’re in and we’ll help you from there.
Contact Our Team

Products

Collaborative Audits

Audit Contests

Bug Bounties

Sherlock AI

Sherlock Shield

Live Security

Leaderboards

App

Live Audits

Live Bug Bounties

Resources

Blog

Docs

Brand Kit

Lifecycle eBook

Referral Program

Sherlock secures Web3 protocols across development, launch, and live operation through a unified lifecycle security model.

Sherlock’s services do not constitute a guarantee against all security incidents or losses. Responsibility for protocol operation and risk management remains with the protocol team.

Follow Us On

Copyright © Sherlock Protocol 2026. All Rights Reserved.