Our Team
We work with the very best
We're a group of independent security researchers with proven track record in both Web3 and traditional security.
![Image of Robert Chen](/_ipx/w_200&q_90/team/robert.jpg)
![Image of Jun Choi](/_ipx/w_200&q_90/team/jun.webp)
![Image of Alex Donn](/_ipx/w_200&q_90/team/alex.webp)
![Image of Christian Cuffari](/_ipx/w_200&q_90/team/christian.webp)
![Image of Daryl Yeo](/_ipx/w_200&q_90/team/daryl.webp)
![Image of Julia Jaworska](/_ipx/w_200&q_90/team/julia.webp)
![Image of Harrison Green](/_ipx/w_200&q_90/team/Harrison-Green.webp)
![Image of Aleksandre Khokhiashvili](/_ipx/w_200&q_90/team/Aleksandre-Khokhiashvili.webp)
![Image of James Wang](/_ipx/w_200&q_90/team/James.webp)
![Image of Tuyet Duong](/_ipx/w_200&q_90/team/tuyet.webp)
![Image of Michal Bochnak](/_ipx/w_200&q_90/team/michal.webp)
![Image of Ajay Shankar](/_ipx/w_200&q_90/team/ajay.webp)
![Image of Akash Gurugunti](/_ipx/w_200&q_90/team/Akash-Gurugunti.webp)
![Image of Woosun Song](/_ipx/w_200&q_90/team/Woosun-Song.webp)
![Image of Sangsoo Kang](/_ipx/w_200&q_90/team/sangsoo.jpg)
![Image of Tamta Topuria](/_ipx/w_200&q_90/team/tamta.jpg)
![Image of Caue Obici](/_ipx/w_200&q_90/team/caue.webp)
![Image of Bruno Halltari](/_ipx/w_200&q_90/team/bruno.webp)
![Image of Nicola Vella](/_ipx/w_200&q_90/team/nicola.webp)
![Image of Swaroop Maddu](/_ipx/w_200&q_90/team/swaroop.jpg)
![Image of Hrvoje Mišetić](/_ipx/w_200&q_90/team/hrvoje.jpg)
![Image of Nicholas Putra](/_ipx/w_200&q_90/team/nicholas-p.jpg)
![Image of Pedro Pinto](/_ipx/w_200&q_90/team/Pedro-Pinto.webp)
![Image of Alec Petridis](/_ipx/w_200&q_90/team/Alec-Petridis.webp)
![Image of Fineas Silaghi](/_ipx/w_200&q_90/team/Fineas-Silaghi.webp)
![Image of Akash Thota](/_ipx/w_200&q_90/team/akash-thota.jpg)
![Image of Vishvesh Rao](/_ipx/w_200&q_90/team/vishvesh.jpg)
![Image of Ye Chan (Jay) Park](/_ipx/w_200&q_90/team/ye-chan.jpg)
Protect your protocol
$5.69B+
On-chain TVL secured
$1.00B+
Vulnerabilities patched
Don't leave your protocol unprotected — reach out to our team of experts to start discussing a security audit.