Valkyri Security
  • Home
  • Web3 Security
  • Request Quote
  • About
Sign in Subscribe

Valkyri Security

UK
Valkyri Security
Your Code Is Audited, Your Keys Aren’t: Why Drains Keep Happening to Web3 Builders and Users

Your Code Is Audited, Your Keys Aren’t: Why Drains Keep Happening to Web3 Builders and Users

Private keys represent the ultimate authority in decentralized systems. They control assets, sign transactions, authenticate identities, and anchor an individual’s entire on-chain reputation. Once a private key is compromised, the attacker gains irreversible and total control. There are no chargebacks, no recovery workflows, and no intermediaries who can intervene.

By Valkyri Security 12 Dec 2025
Critical OS Command Injection Report: CVE-2025-11953

Critical OS Command Injection Report: CVE-2025-11953

1. Executive Summary CVE-2025-11953 is a Critical (CVSS 9.8) OS Command Injection vulnerability found in the React Native Community CLI's Metro development server. Component Vulnerability Type CVSS Score Impact @react-native-community/cli-server-api (4.8.0 - 20.0.0-alpha.2) OS Command Injection (CWE-78) 9.8 (Critical) Unauthenticated

By Valkyri Security 03 Dec 2025
Critical Vulnerability Report: React Server Components RCE (CVE-2025-55182)

Critical Vulnerability Report: React Server Components RCE (CVE-2025-55182)

1. Executive Summary CVE-2025-55182 is a Critical (CVSS 10.0) Pre-auth Remote Code Execution (RCE) vulnerability affecting React Server Components (RSC). The flaw is a Deserialization of Untrusted Data (CWE-502) issue in React's "Flight" protocol. Component Vulnerability Type CVSS Score Impact React Server Components (19.0.

By Valkyri Security 03 Dec 2025
18 Popular npm Packages Hacked: 2 Billion Weekly Users at Risk

18 Popular npm Packages Hacked: 2 Billion Weekly Users at Risk

On September 8, 2025, the npm ecosystem experienced a major coordinated supply-chain attack. A total of 18 widely-used JavaScript packages were compromised with malicious code designed to intercept cryptocurrency transactions in browsers. These packages collectively see over 2 billion weekly downloads, making this incident one of the most impactful attacks

By Valkyri Security 09 Oct 2025
How to Hack a Web3 Wallet (Legally): A Full-Stack Pentesting Guide

How to Hack a Web3 Wallet (Legally): A Full-Stack Pentesting Guide

INTRODUCTION Crypto wallets are the critical bridge (or gateway) between Web2 and Web3 by which you interact with web3 based dApps. . But what if the very tool you rely on has hidden security flaws? That’s a serious risk. This guide is your essential companion for uncovering bugs in crypto

By Valkyri Security 26 Aug 2025
Valkyri Security
  • Sign up
Powered by Ghost

Valkyri Security

Guardians of the Smart Contracts