Find launch blockers early.
Review fund loss paths, privilege escalation, accounting drift, oracle assumptions, and integration failure modes before users depend on the system.
- Ship or hold verdict
- Critical flow review
- Retest criteria
Independent Web3 security research
We review Solidity code, protocol accounting, bridges, wallet flows, APIs, and exploit reports. You get ranked findings, proof paths, patch guidance, and retest criteria.
Client outcomes
Built for smart contract releases, DeFi accounting changes, bridge integrations, wallet and API flows, bounty triage, and incident follow up.
Review fund loss paths, privilege escalation, accounting drift, oracle assumptions, and integration failure modes before users depend on the system.
Separate exploitable code paths from theoretical issues across access control, accounting, oracle, and integration logic.
Reproduce the claim, measure asset impact, assign severity, and confirm whether the issue deserves payout or escalation.
Review transactions, roles, configuration, and reachable exploit paths when protocol state or user funds look wrong.
Services
Scope the asset flows that can cost money: contract logic, protocol accounting, bridges, wallets, APIs, exploit reports, and fixes.
Manual Solidity review of state transitions, access control, upgrades, external calls, and invariant assumptions.
Review vault shares, reward math, fee logic, oracle inputs, liquidation paths, staking flows, and AMM behavior.
Test message validation, signer flows, SDK routing, refund paths, relayer authorization, and API permissions.
Verify bug bounty reports, suspicious transactions, risky diffs, fixes, and residual exposure.
Upcoming launch?
Audit surface
Reviews follow how funds move through contracts, oracles, bridges, wallets, APIs, and operational roles.
Review access control, upgradeability, state transitions, accounting logic, external calls, and invariant assumptions.
Focus: exploit paths, invariant breaks, patchable findings.Engagement model
Define target repos, deployed addresses, authorization, critical flows, timeline, and success criteria.
Trace roles, assets, integrations, trust boundaries, oracle inputs, state transitions, and external dependencies.
Validate exploitability with targeted proofs, fork tests, invariant reasoning, and economic impact analysis.
Deliver ranked findings, executive framing, reproduction steps, remediation guidance, and retest criteria.
Review fixes, note residual risk, and help the team close the loop before launch or public disclosure.
Reporting
Each finding explains what breaks, how to reproduce it, which assets are exposed, and how to verify the fix.
handoff:
status: reproducible
engineer_action: patch_accounting_boundary
stakeholder_action: defer_launch_until_retest
retest: ready_after_fix
Operating standards
Engagements are structured to protect client systems, minimize disruption, and produce evidence that can be used by both engineers and decision makers.
Testing begins after scope, target ownership, and permitted techniques are understood.
Details are shared with authorized stakeholders and are not published without permission or coordinated disclosure context.
Evidence is minimized, redacted where possible, and collected only to demonstrate impact.
Start an engagement
Include target repos, deployed addresses, docs, app or API links, authorization context, timeline, and the decision you need support on.