CER.live Security Auditor
'Not your keys, not your coins' is the rule, but if you must use an exchange, use a secure one. CER.live provides independent cybersecurity audits and tracks Proof-of-Reserves to verify that exchanges actually hold the funds they claim.
Problems it solves
Opaque Exchange Solvency
Identify which exchanges have provided public, verifiable Proof-of-Reserves (PoR) and which are still operating behind a 'black box'.
Weak Cybersecurity
Check for critical security features like multi-sig cold storage, bug bounty programs, and historical hack resilience.
Audit Verification
Verify if an exchange's self-reported security claims are backed by independent 3rd-party audits from reputable firms.
How to use correctly
1. Search for your exchange on CER.live and check its 'Security Score' (AAA to D).
2. Review the 'Proof-of-Reserves' status. A green checkmark indicates a verifiable, recent PoR report.
3. Check the 'Cybersecurity Rating' breakdown, looking specifically for Penetration Testing and Bug Bounty status.
4. Avoid exchanges that score below a 'B' or have a history of unaddressed security vulnerabilities.
Limitations
- ✕Proof-of-Reserves only shows assets, not liabilities. An exchange could be 'solvent' but still highly leveraged.
- ✕A high security score is not a 100% guarantee against future hacks or internal fraud.
- ✕Security audits are snapshots in time; a platform's security posture can degrade between audit cycles.
Best For
Investors who hold significant capital on centralized exchanges and want to verify the security and solvency of their chosen platforms.