$CENTRY
Cybercentry, an Artificial Intelligence (AI) agent powered by Base, is the world’s first AI-powered Cyber Security Information and Intelligence Hub, revolutionising how cyber security knowledge is accessed and applied.
Whitepaper
This document outlines the strategic vision and operational framework for Cybercentry, a groundbreaking project designed to revolutionise the cyber security landscape through blockchain technology.
Blog
Stay updated with the latest insights and developments in the world of Cybercentry, where we are reshaping the cyber security landscape using cutting-edge blockchain technology.
Cybercentry One
Your unified platform for AI-powered cyber security. Access a complete suite of trusted services and solutions, ranging from threat intelligence and compliance support to advanced protection tools, all conveniently delivered through a single, centralised platform.
Tokenomics Plan
-
Public Sale
Read More(37.5%): 375 million tokens allocated for public participation, fostering broad adoption.
-
-
Early Adopter Incentive
Read MoreEarly Adopter Incentive (2.5%): 25 million tokens, fully released on 17.12.2025, rewarding early adopters and long-term holders.
-
Liquidity Provisions
Read More(5.0%): 50 million tokens, fully released on 17.12.2025, supporting ecosystem liquidity.
-
Utility
Read More(5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, enabling platform functionality.
-
Community & Marketing
Read More(5.0%): 50 million tokens, released over 6 months, 17.12.2025 to 17.06.2026, driving user engagement.
-
Team
Read More(20.0%): 200 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, supporting development.
-
Treasury
Read More(12.5%): 125 million tokens, released over 12 months, 17.12.2025 to 17.12.2026, funding future initiatives.
TOKEN DEPLOYMENT
Base
Base specialises in the seamless deployment of blockchain-based tokens. For the SCENTRY project, they are tasked with the precise deployment of the SCENTRY token onto the Base platform, ensuring its integration is secure, efficient, and fully aligned with Base’s scalable Ethereum Layer 2 infrastructure.
Token Creation
Virtuals Protocol
Virtuals Protocol specialises in the technical creation of blockchain-based tokens and the Agent Commerce Protocol (ACP), Software Development Kit (SDK) Framework for the @centry_agent AI-agent. For the $CENTRY project, they leverage their extensive blockchain expertise to meticulously develop the $CENTRY token, ensuring both its robustness and functionality.
Purchase Cybercentry Tokens on Base, Uniswap and Virtuals Protocol
Cybercentry ($CENTRY) is available for purchase on Base, Uniswap and Virtuals Protocol. Join us in embracing a secure and transparent way to invest in cyber security through seamless trading.
Be amongst the first to participate in the Cybercentry ecosystem. Start trading and secure your tokens!
Blog
View all-
SC10:2025 - Denial Of Service (DoS)
Leigh CronianDescription: A Denial of Service (DoS) attack in Solidity involves exploiting vulnerabilities to exhaust resources like gas, CPU cycles, or storage, making a smart contract unusable. Common types include gas...
SC10:2025 - Denial Of Service (DoS)
Leigh CronianDescription: A Denial of Service (DoS) attack in Solidity involves exploiting vulnerabilities to exhaust resources like gas, CPU cycles, or storage, making a smart contract unusable. Common types include gas...
-
SC09:2025 - Insecure Randomness
Leigh CronianDescription: Random number generators are essential for applications like gambling, game-winner selection, and random seed generation. On Ethereum, generating random numbers is challenging due to its deterministic nature. Since Solidity...
SC09:2025 - Insecure Randomness
Leigh CronianDescription: Random number generators are essential for applications like gambling, game-winner selection, and random seed generation. On Ethereum, generating random numbers is challenging due to its deterministic nature. Since Solidity...
-
SC08:2025 - Integer Overflow and Underflow
Leigh CronianDescription: Ethereum Virtual Machine (EVM) defines fixed-size data types for integers. This implies that the range of numbers that an integer variable can represent is finite. For instance, a “uint8”...
SC08:2025 - Integer Overflow and Underflow
Leigh CronianDescription: Ethereum Virtual Machine (EVM) defines fixed-size data types for integers. This implies that the range of numbers that an integer variable can represent is finite. For instance, a “uint8”...
-
SC07:2025 - Flash Loan Attacks
Leigh CronianDescription: Flash loan attacks exploit the ability to borrow large sums of funds without collateral within a single transaction. These attacks leverage the atomic nature of blockchain transactions, where all...
SC07:2025 - Flash Loan Attacks
Leigh CronianDescription: Flash loan attacks exploit the ability to borrow large sums of funds without collateral within a single transaction. These attacks leverage the atomic nature of blockchain transactions, where all...