Random Walk is an independent Web3 developer who creates smart contracts for generating unique NFT images with an engaging art style for players placing bets in cryptocurrency.
Although the business operates in an unregulated sector, its specifics require heightened attention to security: once launched on the blockchain, vulnerabilities can no longer be fixed, and even minor weaknesses in the code can lead to financial and reputational losses.
For the Random Walk smart contract audit, the Datami team applied a White-box approach. We combined dynamic on-chain testing with static code analysis in a simulated environment, which allowed us to detect both common and hidden vulnerabilities in advance.
During the project, we used tools such as MythX, Manticore, Oyente, Slither, SolHint, Cloc, Remix, Ropsten testnet, as well as manual line-by-line code review to achieve maximum accuracy.
The work on the Random Walk project consisted of several key stages. We prepared a testing environment, performed a full code review using different methods, and after fixes conducted a retest to ensure that vulnerabilities were eliminated and security was confirmed before launch on the Polygon mainnet.
Thanks to well-organized processes, the audit was carried out as quickly as possible while maintaining quality standards.
Every
Within 5 days, the Datami team audited and prepared for release an NFT generator smart contract, a marketplace smart contract for token trading, a betting contract, and an ERC20 token smart contract.
As a result, 1 medium, 3 low, and 5 informational vulnerabilities were found. In particular, the audit revealed the absence of double-checking the recipient address status for crypto assets and the possibility of withdrawing rewards bypassing the smart contract rules. These issues were fixed within 3 days.
After implementing the recommended changes, the retest confirmed that the Web3 solutions met security standards. The client received:
All project goals were achieved, and the Random Walk developer successfully launched its solutions on Polygon Mainnet.
Blockchain does not forgive mistakes. Sometimes a single vulnerability is enough for attackers to deprive the owner of all assets and destroy user trust not only in the new smart contract but also in the developer’s other projects.
This case study demonstrates the importance of an independent smart contract audit before launch: thanks to the early detection of 9 vulnerabilities, Random Walk successfully fixed the code before release and left hackers with no chance of success.
Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.
Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.
Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co