Contact
Contact Our Team
January 17, 2026
featured post

How Solana achieved 2 years uptime after launching with $3M | Matt Sorg (Solana Foundation)

Join Our Community
and Stay Up to Date

Join Sherlock on Discord

How Solana achieved 2 years uptime after launching with $3M | Matt Sorg (Solana Foundation)

Solana launched mainnet with $2-3 million in spring 2018 when typical L1s raised $100 million plus. Matt Sorg, VP of Technology at Solana Foundation, reveals how they transformed from frequent network halts to approaching two years of continuous uptime through systematic engineering, multi-client architecture, and a technically savvy validator network that independently reviews every code release.

Jan 17, 2026

Coinbase's Auditing Standards with Shashank Agrawal

Coinbase’s internal security process is designed so that it’s very rare for an external audit to reveal any high or critical issues. Shashank Agrawal, Head of Security at Base, breaks down their multi-round validation workflow, how it protects more than $7B in Base TVL, and why off-chain infrastructure receives the same scrutiny as smart contracts.

Nov 19, 2025

Ethereum Foundation's path to 10,000 TPS and Bitcoin's 51% attack risk | Justin Drake

Jack Sanford speaks with Justin Drake from the Ethereum Foundation about the security economics driving L1 infrastructure over the next decade.

Nov 5, 2025

Cosmos Labs' 3 pivots in 6 months: Timeboxing experiments to find PMF | Barry Plunkett

This week Barry Plunkett, co-CEO of Cosmos Labs, joins our CEO Jack Sanford to discuss prioritizing security in development, Cosmos Hub deployment, and more!

Oct 22, 2025

Centrifuge's serial audits: 6 security reviews that reshaped RWA architecture | Jeroen Offerijns

In this episode, Jeroen walks through Centrifuge's controversial security methodology, their co-authorship of the ERC-7540 standard with competitor Maple Finance, and why they're building freely immutable infrastructure modeled on Maker's 6-year-old vat contract that has never needed an upgrade.

Oct 15, 2025

Validator sniping: How to harvest IP addresses to redirect MEV | Sebastian Bürgel (Gnosis)

This week, the VP of Technology at Gnosis, Sebastian Burgel, joins Jack Sanford to discuss network-layer security gaps, the early days of building on Ethereum, and more.

Oct 10, 2025
1 / 2

Secure Your Protocol with sherlock

Sherlock delivers complete lifecycle security, from early development to protection on live code. Tell us what stage you’re in and we’ll help you from there.
Contact Our Team

Products

Collaborative Audits

Audit Contests

Bug Bounties

Sherlock AI

Sherlock Shield

Live Security

Leaderboards

App

Live Audits

Live Bug Bounties

Resources

Blog

Docs

Brand Kit

Lifecycle eBook

Sherlock secures Web3 protocols across development, launch, and live operation through a unified lifecycle security model.

Sherlock’s services do not constitute a guarantee against all security incidents or losses. Responsibility for protocol operation and risk management remains with the protocol team.

Follow Us On

Copyright © Sherlock Protocol 2026. All Rights Reserved.