Delays during an exploit compound risk far beyond what’s drained on-chain — they degrade trust, coordination, and recovery.
The recent @CetusProtocol exploit reminded the space: incident response isn't a postmortem. It's part of protocol architecture.
Lunos Security Hub connects protocols to simulation, monitoring, and IR services — not after things break, but before they do.
Because real preparedness is built in, not bolted on.
https://t.co/cR7Pua8pnw 🛡️