Our smart contract security audits adhere to a stringent process, with the objective of detecting even the most inventive and elusive vulnerabilities, exploits, and loopholes within the protocol logic.
- Extensive Manual Code Review
- Identification logical flaws
- Vulnerability detection and analysis (e.g., reentrancy, gas limit, flash loan attacks, etc.)
- Detect inconsistencies with the desired security model
- Verification of the fixed code version with all the recommendations and their statuses
Intermediate Audit Report
Сontains all vulnerabilities found and the recommended fixes to mitigate them. It helps the developer's team to start fixing the issues long before our final audit report.
Final Audit Report
Our final audit report outlines all of the logical errors, inconsistencies, and vulnerabilities discovered during the audit and recommendations for how to fix them. Can be made public at the client's discretion.
How does it work
The our audit report outlines all of the logical errors, inconsistencies, and vulnerabilities discovered during the audit and recommendations for how to fix them.
Yes, we always provide a confidential audit report so that you can correct any errors found. The report can be made public at the clients discretion. If all vulnerabilities are successfully mitigated, this will demonstrate increased security to your partners and clients.
The timing and costs of the audit will vary depending on the complexity and size of the code. Once you get in touch with us and share the code, we'll quickly provide you with a complete quotation. It is impossible to determine the terms of the audit without examining the code.
REQUEST AN AUDIT