Services
Comprehensive offensive security services tailored to the Web3 ecosystem. Every engagement is led by a principal-level researcher.
Smart Contract Audit
Manual security review of smart contracts across EVM and non-EVM chains. Our methodology covers the full spectrum of smart contract vulnerabilities: reentrancy, access control flaws, flash loan attack vectors, oracle manipulation, upgrade proxy risks, integer over/underflow, and critical business logic flaws.
We combine manual expert review with state-of-the-art automated tooling to achieve coverage that neither approach achieves alone. Every finding includes severity ratings, proof-of-concept exploits where applicable, and actionable remediation guidance.
Our audits go beyond application-layer contracts. We have reviewed RSKj virtual machine internals and trie structures, Evmos execution layer logic, IBC cross-chain routing and light-client relay logic, ZK-SNARK circuit isolation and proof aggregation middleware, Noise protocol handshake implementations, ephemeral key exchange, and ratcheting behaviors in distributed messaging systems — all at the source code and protocol specification level.
Tools & Methods
- Custom Viper Slither detectors (static analysis)
- Aderyn (static analysis)
- Echidna (property-based fuzzing)
- Medusa (property-based fuzzing)
- Halmos (symbolic execution)
- Certora Prover (formal verification)
- Manual cryptographic primitive review
- ZK circuit analysis and trace inspection
Deliverables
- Detailed audit report with severity ratings (Critical / High / Medium / Low / Informational)
- Proof-of-concept exploits for critical/high findings
- Remediation guidance and fix verification
- Executive summary for non-technical stakeholders
Red Team Operations
Full-scope adversary simulation engagements that test your organization's security posture against real-world attack scenarios. We cover external network attacks, internal lateral movement, social engineering campaigns, and physical intrusion where scoped.
Our methodology aligns with TIBER-EU and CBEST frameworks where required, ensuring regulatory compliance while delivering genuine adversarial insight. The goal isn't to find one vulnerability — it's to demonstrate the full attack chain an adversary would exploit.
Deliverables
- Executive summary for leadership
- Detailed technical report with attack chain documentation
- Evidence package with screenshots and logs
- Interactive debrief session with your security team
Blockchain Infrastructure Security
Security assessment of the non-contract layer: node infrastructure hardening, RPC endpoint security, key management architecture (HSMs, MPC), validator security, monitoring & alerting setup, and threat modeling for protocol backends.
Smart contracts don't exist in a vacuum. The infrastructure running your chain, validators, and backend services is equally critical. We assess the full stack — from cloud configuration to key ceremony processes.
Previous engagements have included federated HSM-based signing infrastructure at RSK/RootStock, two-way peg bridge security, gas-cost inflation vector analysis, validator infrastructure at ZetaChain, and consensus fault detection on Solana, TON, and Sui core implementations.
Tools & Methods
- Custom infrastructure scanning tools
- Cloud security assessment frameworks
- Network analysis tools
- Federated HSM security assessment
- Consensus fault analysis
- VM internals review (RSKj, EVM, SVM, TVM)
Deliverables
- Infrastructure security assessment report
- Threat model documentation
- Hardening recommendations with priority matrix
- Architecture review findings
Security Architecture Review
Design-phase threat modeling and architecture review for protocols, bridges, L2s, and DeFi systems before code is written. Finding architectural flaws before implementation is orders of magnitude cheaper than fixing them post-launch.
We review your protocol design, trust assumptions, economic incentives, and system architecture to identify risks before they become vulnerabilities. This includes cross-chain bridge designs, rollup architectures, DeFi protocol mechanics, and governance systems.
Deliverables
- Threat model document
- Architecture risk assessment
- Design recommendations and alternative approaches
- Security requirements specification
Vulnerability Research
Bespoke research engagements for vendors or protocols seeking deep-dive analysis into specific attack surfaces. Our research background spans CVE discovery, forensic analysis (Netherlands Forensic Institute), firmware reverse engineering, and embedded systems security.
Whether you need a targeted investigation into a suspected vulnerability class, a comprehensive security analysis of a new protocol design, or expert forensic analysis of a security incident, we bring researcher-grade depth to every engagement.
Deliverables
- Research report with technical findings
- CVE submissions where applicable
- Proof-of-concept demonstrations
- Remediation and mitigation strategies
vCISO / Advisory
Fractional Chief Information Security Officer services for Web3 teams that need senior security leadership without the full-time overhead. We help you build security programs, define policies, and establish incident response capabilities.
From hiring your first security engineer to setting up bug bounty programs, security review pipelines, and compliance frameworks — we provide strategic security guidance tailored to the unique challenges of Web3 organizations.
Deliverables
- Security program roadmap
- Policy and procedure documentation
- Incident response playbooks
- Ongoing advisory and mentorship
// emerging attack surface
AI Security & AI × Web3
LLM & AI System Security
Large language models introduce attack surfaces that traditional security tooling doesn’t cover. We assess your AI stack end-to-end — from model inputs to tool-use boundaries — before adversaries do.
Engagement Types
- LLM penetration testing & red teaming
- Prompt injection & jailbreak assessment
- RAG architecture security review
- AI agent trust boundary analysis
- Training data poisoning assessment
- LLM threat modeling & risk report
AI Agent Security
Autonomous AI agents with tool access, memory, and on-chain signing authority are a new class of privileged system. We identify where agent trust boundaries break down and attackers can redirect actions.
Engagement Types
- Agentic workflow threat modeling
- Tool-use and plugin security assessment
- Multi-agent trust chain analysis
- On-chain AI agent privilege audit
- MCP server security review
- Autonomous execution boundary testing
AI-Augmented Smart Contract Audits
We combine manual expert review with LLM-assisted analysis to find what each method misses alone. AI surfaces pattern-level issues at speed; our researchers catch the logic flaws that models can’t reason about yet.
Engagement Types
- AI-augmented Solidity & Rust audit
- LLM-assisted vulnerability triage
- Automated fuzzing + manual validation
- Hybrid audit report with AI trace
- Pre-audit AI scan for dev teams
- Continuous AI monitoring integration
Web3 AI Infrastructure Security
Protocols integrating AI oracles, on-chain ML inference, or LLM-driven governance introduce novel risks at the intersection of both stacks. We assess the security of AI components embedded in decentralized systems.
Engagement Types
- AI oracle manipulation assessment
- On-chain ML inference security review
- LLM-integrated DeFi protocol audit
- AI supply chain risk assessment
- Model integrity & provenance audit
- Cross-stack (AI + Web3) threat modeling
// web2 & full-spectrum
Beyond the Blockchain
Web Application & API Penetration Testing
Manual penetration testing of web applications, REST/GraphQL APIs, and authentication flows. No scanner-first methodology — we test like an attacker with time and motivation.
Engagement Types
- Web application penetration test
- REST & GraphQL API security assessment
- Authentication & authorization testing
- Business logic vulnerability analysis
- Session management review
- File upload & injection testing
Network & Infrastructure Penetration Testing
External and internal network penetration tests. From external perimeter enumeration through to domain compromise. Relevant for Web3 companies with traditional corporate infrastructure.
Engagement Types
- External perimeter penetration test
- Internal network penetration test
- Active Directory attack path analysis
- VPN & remote access security review
- Cloud infrastructure assessment
- Wireless network security testing
Mobile Application Security
Mobile application security assessments for iOS and Android. Particularly relevant for Web3 wallet apps and DeFi mobile clients where private key handling and biometric bypass are critical vectors.
Engagement Types
- iOS application security assessment
- Android application security assessment
- API traffic interception & manipulation
- Binary reverse engineering
- Runtime tampering & hooking
- Secure storage & key handling review