Services
Comprehensive offensive security services tailored to the Web3 ecosystem. Every engagement is led by a principal-level researcher.
Smart Contract Audit
Manual security review of smart contracts across EVM and non-EVM chains. Our methodology covers the full spectrum of smart contract vulnerabilities: reentrancy, access control flaws, flash loan attack vectors, oracle manipulation, upgrade proxy risks, integer over/underflow, and critical business logic flaws.
We combine manual expert review with state-of-the-art automated tooling to achieve coverage that neither approach achieves alone. Every finding includes severity ratings, proof-of-concept exploits where applicable, and actionable remediation guidance.
Tools & Methods
- Custom Viper tooling (static analysis)
- Aderyn (static analysis)
- Echidna (property-based fuzzing)
- Medusa (property-based fuzzing)
- Halmos (symbolic execution)
- Certora Prover (formal verification)
Deliverables
- Detailed audit report with severity ratings (Critical / High / Medium / Low / Informational)
- Proof-of-concept exploits for critical/high findings
- Remediation guidance and fix verification
- Executive summary for non-technical stakeholders
Red Team Operations
Full-scope adversary simulation engagements that test your organization's security posture against real-world attack scenarios. We cover external network attacks, internal lateral movement, social engineering campaigns, and physical intrusion where scoped.
Our methodology aligns with TIBER-EU and CBEST frameworks where required, ensuring regulatory compliance while delivering genuine adversarial insight. The goal isn't to find one vulnerability — it's to demonstrate the full attack chain an adversary would exploit.
Deliverables
- Executive summary for leadership
- Detailed technical report with attack chain documentation
- Evidence package with screenshots and logs
- Interactive debrief session with your security team
Blockchain Infrastructure Security
Security assessment of the non-contract layer: node infrastructure hardening, RPC endpoint security, key management architecture (HSMs, MPC), validator security, monitoring & alerting setup, and threat modeling for protocol backends.
Smart contracts don't exist in a vacuum. The infrastructure running your chain, validators, and backend services is equally critical. We assess the full stack — from cloud configuration to key ceremony processes.
Tools & Methods
- Custom infrastructure scanning tools
- Cloud security assessment frameworks
- Network analysis tools
Deliverables
- Infrastructure security assessment report
- Threat model documentation
- Hardening recommendations with priority matrix
- Architecture review findings
Security Architecture Review
Design-phase threat modeling and architecture review for protocols, bridges, L2s, and DeFi systems before code is written. Finding architectural flaws before implementation is orders of magnitude cheaper than fixing them post-launch.
We review your protocol design, trust assumptions, economic incentives, and system architecture to identify risks before they become vulnerabilities. This includes cross-chain bridge designs, rollup architectures, DeFi protocol mechanics, and governance systems.
Deliverables
- Threat model document
- Architecture risk assessment
- Design recommendations and alternative approaches
- Security requirements specification
Vulnerability Research
Bespoke research engagements for vendors or protocols seeking deep-dive analysis into specific attack surfaces. Our research background spans CVE discovery, forensic analysis (Netherlands Forensic Institute), firmware reverse engineering, and embedded systems security.
Whether you need a targeted investigation into a suspected vulnerability class, a comprehensive security analysis of a new protocol design, or expert forensic analysis of a security incident, we bring researcher-grade depth to every engagement.
Deliverables
- Research report with technical findings
- CVE submissions where applicable
- Proof-of-concept demonstrations
- Remediation and mitigation strategies
vCISO / Advisory
Fractional Chief Information Security Officer services for Web3 teams that need senior security leadership without the full-time overhead. We help you build security programs, define policies, and establish incident response capabilities.
From hiring your first security engineer to setting up bug bounty programs, security review pipelines, and compliance frameworks — we provide strategic security guidance tailored to the unique challenges of Web3 organizations.
Deliverables
- Security program roadmap
- Policy and procedure documentation
- Incident response playbooks
- Ongoing advisory and mentorship
// emerging attack surface
AI Security & AI × Web3
LLM & AI System Security
Large language models introduce attack surfaces that traditional security tooling doesn’t cover. We assess your AI stack end-to-end — from model inputs to tool-use boundaries — before adversaries do.
Engagement Types
- LLM penetration testing & red teaming
- Prompt injection & jailbreak assessment
- RAG architecture security review
- AI agent trust boundary analysis
- Training data poisoning assessment
- LLM threat modeling & risk report
AI Agent Security
Autonomous AI agents with tool access, memory, and on-chain signing authority are a new class of privileged system. We identify where agent trust boundaries break down and attackers can redirect actions.
Engagement Types
- Agentic workflow threat modeling
- Tool-use and plugin security assessment
- Multi-agent trust chain analysis
- On-chain AI agent privilege audit
- MCP server security review
- Autonomous execution boundary testing
AI-Augmented Smart Contract Audits
We combine manual expert review with LLM-assisted analysis to find what each method misses alone. AI surfaces pattern-level issues at speed; our researchers catch the logic flaws that models can’t reason about yet.
Engagement Types
- AI-augmented Solidity & Rust audit
- LLM-assisted vulnerability triage
- Automated fuzzing + manual validation
- Hybrid audit report with AI trace
- Pre-audit AI scan for dev teams
- Continuous AI monitoring integration
Web3 AI Infrastructure Security
Protocols integrating AI oracles, on-chain ML inference, or LLM-driven governance introduce novel risks at the intersection of both stacks. We assess the security of AI components embedded in decentralized systems.
Engagement Types
- AI oracle manipulation assessment
- On-chain ML inference security review
- LLM-integrated DeFi protocol audit
- AI supply chain risk assessment
- Model integrity & provenance audit
- Cross-stack (AI + Web3) threat modeling