In late 2024, the Ethereum Basis, along with Secureum, The Pink Guild, and Safety Alliance (SEAL), launched the ETH Rangers Program, an initiative to offer stipends for people doing public items safety work within the Ethereum ecosystem.
The aim of this system was simple: to fund impartial efforts that improve the resilience of the Ethereum ecosystem, and to acknowledge individuals with demonstrated observe data of significant contributions to necessary safety work that advantages Ethereum as a complete.
Now that the six month ETH Rangers Program has wrapped up, we need to share the outcomes of the 17 stipend recipients’ work. The breadth of their output is spectacular, from vulnerability analysis and safety tooling, to schooling, risk intelligence, and incident response.
Throughout recipient initiatives, consolidated outcomes embrace:
Over 5.8 million {dollars} in funds recovered or frozenOver 785 vulnerabilities, consumer bugs, and proof of ideas reported or catalogedApproximately 100 state sponsored operatives recognized throughout greater than teamsOver 209,000 views and customers reached with risk consciousness and investigative content800+ groups engaged in sponsored safety challenges and investigationsOver 80 workshops, talks, and technical or instructional sources delivered36+ incident responses handled7+ open supply tooling repositories, frameworks, and implementations developed or improved
These ETH Rangers Program outcomes show the fact that securing a decentralized community requires a decentralized protection.
From protocol-level vulnerability analysis to world developer schooling, these impartial researchers constructed infrastructure that may multiply safety results throughout all the ecosystem.
Undertaking Highlights
SunSec – DeFiHackLabs
SunSec, with the DeFiHackLabs neighborhood, delivered a unprecedented quantity of safety schooling and tooling work. Over the stipend interval, DeFiHackLabs:
Constructed an Incident Explorer platform for looking out and analysing DeFi incidents with proof-of-concept (PoC) exploits and root trigger evaluation, protecting 620+ PoCs to this point.Ran a PoC Summer season Contest that acquired 43 new proof-of-concept submissions from the neighborhood.Delivered six workshop classes at Korea College protecting sensible contract bug lessons, auditing, and assault case evaluation.Partnered with HITCON CTF (717 taking part groups) to create a Web3 safety problem.Had seven talks chosen at COSCUP 2025, protecting subjects from phishing to formal verification.Ran CTF coaching classes, writing campaigns, a Web3 Safety Membership, and a expertise referral program to attach white hats with employment alternatives.
The sheer scale of neighborhood activation right here is notable. DeFiHackLabs operates as a multiplier, turning one stipend into instructional output that reaches lots of of safety researchers.
Ketman Undertaking – DPRK IT Employee Investigations
One recipient used their stipend to construct and scale the Ketman Undertaking, targeted on discovering and expelling North Korean (DPRK) IT employees who’ve infiltrated blockchain tasks underneath pretend identities.
Over the stipend interval, they:
Reached out to roughly 53 tasks and recognized round 100 totally different DPRK IT employees working inside Web3 organizations.Revealed investigative articles on ketman.org that reached over 3,300 energetic customers and 6,200 web page views, protecting subjects reminiscent of account takeover techniques, freelance platform infiltration, and DPRK-Russia connections.Developed and open-sourced gh-fake-analyzer, a GitHub profile evaluation software for detecting suspicious exercise patterns, now out there on PyPI.Co-authored the DPRK IT Staff Framework with SEAL, which has develop into a typical reference doc for the trade.Contributed information to the Lazarus.group risk intelligence challenge, with their work featured in a presentation at DEF CON.
This work instantly addresses one of the vital urgent operational safety threats dealing with the Ethereum ecosystem right now.
Nick Bax – Incident Response and Risk Intelligence
Nick Bax contributed throughout a number of fronts, primarily by means of SEAL 911 incident response, DPRK risk mitigation, and public consciousness.
Contributed to over 36 SEAL 911 tickets, together with helping with the Loopscale exploit incident response that resulted within the return of $5.8M.As a part of a group, recognized and notified 30+ groups that they had been using DPRK IT employees, and coordinated the freezing of mid-six-figures of funds acquired by these employees.Created an consciousness video about DPRK “Pretend VC” scams that acquired 200,000 views on X, with a number of crypto executives publicly crediting it for serving to them keep away from being hacked.Recognized and disclosed a homoglyph assault utilized by the “ELUSIVE COMET” risk group to evade Zoom’s suspicious identify detection, ensuing within the vulnerability being patched.Represented SEAL at a US Division of Treasury roundtable on DPRK hacker mitigations and spoke at a convention at Interpol Headquarters in Lyon.
Guild Audits – Safety Schooling in Africa and Past
Guild Audits ran intensive sensible contract safety bootcamps, coaching the following technology of Ethereum safety researchers.
Bootcamp cohorts educated researchers throughout Africa, Asia, Europe, and the Americas, who went on to report 110+ vulnerabilities throughout main audit contest platforms, together with Sherlock, Code4rena, Codehawks, Cantina, and Immunefi, with a number of college students rating within the prime 10 on leaderboards.College students printed 55+ technical articles, proposed EIPs, replayed real-world hacks, and performed pro-bono audits for open-source tasks reminiscent of Coinsafe and SIR.On 8 November 2025, Guild Audits hosted Africa’s first Web3 Safety Summit, bringing collectively safety researchers, auditors, and builders from throughout the continent.
The capacity-building influence of Guild Audits’ sensible contract safety bootcamps is critical, making a pipeline of expert safety researchers in areas which were traditionally underrepresented within the Ethereum safety neighborhood.
Palina Tolmach – Kontrol: Usable Formal Verification
Palina Tolmach of Runtime Verification labored on bettering Kontrol, a proper verification software for Ethereum sensible contracts, to make the software extra accessible to builders and safety researchers.
Key Kontrol enhancements delivered embrace:
Improved output readability – cleaner error messages, decoded failure causes, console.log assist in proofs, and pretty-printed path situations, making proof outcomes far simpler to interpret.Counterexample technology – when a proof fails, Kontrol can now routinely generate a runnable Foundry check demonstrating the failure, drastically lowering the iteration time for formal verification.Structured symbolic storage – automated technology of typed storage representations by way of a brand new kontrol setup-storage command, simplifying proof setup.Complete documentation overhaul – created new guides for bytecode verification, dynamic sorts, debugging, and all supported cheatcodes.Lemma enhancements – upstreamed important lemmas to KEVM for higher automated reasoning, together with assist for immutable variables and whitelist cheatcodes.
All of this work is open supply at github.com/runtimeverification/kontrol, bettering the formal verification tooling panorama for all safety researchers.
Ethereum Execution Consumer DoS Analysis
A analysis group developed a testing framework to systematically consider the robustness of Ethereum execution purchasers underneath message-flooding denial-of-service assaults.
By testing all 5 main execution purchasers (Geth, Besu, Erigon, Nethermind, and Reth) they found 14 bugs throughout totally different community protocol layers. These bugs can result in:
Uneven CPU consumption – the place an attacker consumes far much less CPU than the sufferer (as much as 4x asymmetry in some circumstances).Denied data propagation – the place a sufferer node turns into unresponsive to look discovery or blockchain information requests (affecting Besu, Erigon, and Nethermind).Node crashes – the place flooding assaults trigger out-of-memory errors and crash the sufferer node (affecting Nethermind, Reth, and Erigon).
The findings spotlight that no execution consumer is totally resistant to message-flooding assaults, and additional efforts are wanted to develop efficient countermeasures (e.g., adaptive rate-limiting). The testing framework and outcomes have been shared with the Ethereum Basis’s Protocol Safety group to tell additional consumer safety analysis.
Different Stipend Recipients
For brevity we couldn’t do a full write-up on all recipient tasks. The remaining recipients contributed throughout a variety of security-related public items:
Wanting Forward
The ETH Rangers Program got down to assist individuals doing unglamorous however important safety work for Ethereum.
The number of their contributions displays the breadth of what “public items safety” means in observe. It is about greater than discovering bugs; it’s additionally about constructing instruments, coaching individuals, documenting information, responding to incidents, and making the ecosystem extra resilient.
By supporting public items safety work, this system built-in new instruments, analysis, and intelligence into the broader Ethereum ecosystem. This decentralized method to protection supplies a stronger basis for builders and customers worldwide.
We’re grateful to all 17 stipend recipients for his or her contributions, and to Secureum, The Pink Guild, and Safety Alliance for his or her collaboration in working the ETH Rangers Program.







