What we Audit
![sol-coin](/_ipx/s_64x64/icons/sol-coin.png)
![Blue spotlight image background](/_ipx/q_90/images/light-small-stars-2.jpg)
Security Methods
How we Audit
We can apply a number of techniques to review your code. We focus on tailoring our usage of these techniques to what makes sense for your specific security needs.
Timeline
Our Auditing Process
We’ll ask exploratory questions to set the groundwork for a successful audit.
We’ll send an MNDA and look at repositories within scope to understand the details of your project and requests.
We’ll deliver a quote based on our expected duration, potential vulnerabilities, and the overall complexity of your project.
We’ll begin our audit and keep you informed of our findings.
At completion, we will send you a report with our finding and suggestions for fixes.
We’ll keep you updated and ask any relevant questions while we’re working on the audit
Protect your protocol
$36.82B+
On-chain TVL secured
$1.00B+
Vulnerabilities patched
Don't leave your protocol unprotected — reach out to our team of experts to start discussing a security audit.