oxorio logo
SMART CONTRACT
SECURITY AUDITS
Our smart contract security audits adhere to a stringent process, with the objective of detecting even the most inventive and elusive vulnerabilities, exploits, and loopholes within the protocol logic.
Our Metodology
  • Extensive Manual Code Review
  • Identification logical flaws
  • Vulnerability detection and analysis (e.g., reentrancy, gas limit, flash loan attacks, etc.)
  • Detect inconsistencies with the desired security model
  • Verification of the fixed code version with all the recommendations and their statuses
OUR REPORTS
Intermediate Audit Report
Сontains all vulnerabilities found and the recommended fixes to mitigate them. It helps the developer's team to start fixing the issues long before our final audit report.
Final Audit Report
Our final audit report outlines all of the logical errors, inconsistencies, and vulnerabilities discovered during the audit and recommendations for how to fix them. Can be made public at the client's discretion.
How does it work
scheme-image scheme-image
CONTACT
Send us your scope, dates, and project details
ESTIMATE
We agree on the price and the deadline
AUDIT
We start the auditing process
PRELIMINARY REPORT
We send the preliminary report to your team
FIXES
Your team fixes the issues
FINAL REPORT
We examine your fixes, update, share and publish final report
15+
PROJECTS AUDITED
250+
VULNERABILITIES FOUND
45 K+
TOTAL LINES OF CODE AUDITED
CLIENTS
If it wasn't for the love of Web3,
we would send rockets into space!
AUDITS
Visit our GitHub to see a full list of audited contracts
FAQ
The our audit report outlines all of the logical errors, inconsistencies, and vulnerabilities discovered during the audit and recommendations for how to fix them.
Yes, we always provide a confidential audit report so that you can correct any errors found. The report can be made public at the clients discretion. If all vulnerabilities are successfully mitigated, this will demonstrate increased security to your partners and clients.
The timing and costs of the audit will vary depending on the complexity and size of the code. Once you get in touch with us and share the code, we'll quickly provide you with a complete quotation. It is impossible to determine the terms of the audit without examining the code.
Please fill in the form below.
REQUEST AN AUDIT

Fill in the details, we will contact you

Do you need Infrastructure Vulnerability Analysis
and Penetration Testing? ⟶ ORDER