Blockchain Security & Smart Contract Audit

Identifying technical and economical vulnerabilities, and preventing exploits in decentralized projects.

Customers
The protocols we specialize in
EVM Compatible Blockchains
Substrate
Polkadot
What we offer:
Private
Security Audit
Security Audit
Subscription
Pre-Audit
(Code review)
Private Security Audit
Projects with stable quality code and detailed documentation
Interim audit
Вug Fixing
Re-audit
Final audit (Deployment verification)
Issuing a Public Report
Comprehensive code check
Issuing an Official Public Report
Who for:
Flow:
    Deliverables:
    3
    5
    4
    2
    1
    Pre-Audit (Code review)
    Projects with incomplete code under development
    Projects without complete documentation, tests, etc.
    Interim audit with the list of recommendations on code assurance
    Base code check
    List of recommendations on code assurance and to-do list for the following comprehensive audit
    Who for:
    Flow:
      Deliverables:
      1
      Security Audit Subscription
      Projects with a large volume of the constantly updated code base
      Projects that need the continuous support of an allocated team
      Standard Security Audit +

      Additional services:
      Deployment scripts verification
      Existed tests verification
      Preparing additional tests for specific scenarios
      Verification of the deployed contracts (e.g. all initialization parameters check, check of the migration to another implementation of upgradeable contract, etc.)
      Monitoring system design and implementation
      Preparation of bots according to monitoring system design
      Validation of the financial model of the project and assessment of possible risks
      Delivering additional security research tasks from the customer aimed at increasing overall system security, availability and decentralization
      Who for:
      Flow:
      2
      1
      4
      3
      5
      7
      6
      8
      9
      Security Audit Methodology
      A group of security engineers are involved in working on the audit. The security engineers check the provided source code independently of each other in accordance with the methodology described below:
      FAQ
      Blog