DEX core contracts, AMM math review, fee invariants, oracle integration.
Open-source smart contract security, built in the open.
Auditing tailored to DeFi, NFTs, DAOs, and core infra.
We meet teams where they are and apply the right mix of automated and manual techniques.
Solidity and Vyper audits for DeFi, NFT, DAO, and core infra.
Learn more in Methodology →Model attack surfaces, trust boundaries, and invariants.
Learn more in Methodology →Static/dynamic scans, fuzzing and test coverage assessment.
Learn more in Methodology →Remediation verification and deployment guidance.
Learn more in Methodology →A transparent, stepwise approach designed for rigor and reproducibility.
We combine automated analysis (e.g., static/dynamic scans, fuzzing) with thorough manual review and reproducible PoCs to produce reports you can trust.
Scoping & Assumptions
Define scope, threat model, trust boundaries, and environment assumptions.
Automated Scans & Coverage
Run static/dynamic analysis and fuzzing; ensure baseline test coverage.
Tools often include linters and scanners; fuzz with common OSS tooling.
Manual Review & Invariant Reasoning
Deep manual analysis, invariants, privilege boundaries, and economic security.
Exploit Simulation & PoC Validation
Reproduce findings with proof-of-concept exploits and scenario testing.
Findings, Severity, Recommendations
Document vulnerabilities, severity, and actionable remediations with references.
Remediation Verification
Verify fixes, update findings, and publish transparent diff in report.
Featured Reports
Read transparent, reproducible reports across DeFi, NFTs, DAOs, infra and more.
Minting flows, metadata integrity, royalties handling, marketplace hooks.
Governance modules, timelock correctness, proposer/queue constraints.
Trusted by teams across the ecosystem
Built in public. Contributions welcome.
We value transparency and reproducibility. Read our guidelines, open issues, submit PRs, and help shape open auditing practices.
GitHub Stats
Live data when available
Open issues welcome for report feedback, methodology proposals, and tooling improvements.
For sensitive findings, use our responsible disclosure workflow.
Open by Default
Transparent processes, public reports, and community review.
Reproducible Audits
PoCs, scripts, and steps you can run yourself.
Continuous Hardening
Post-audit guidance and verification, not one-off PDFs.