Blockchain Security

Comprehensive Audit Services for Web3 Projects

As part of our ongoing support for the projects we work with, we provide access to top-tier blockchain audit services — fast, reliable, and deeply technical — through our portfolio company MixBytes. Projects backed by us get priority treatment, including a 10% discount and other founder-friendly terms.

Private Security Audit

Who it's for:

Projects with stable, high-quality code and detailed documentation.

Process:

1. Interim audit
2. Bug fixing
3. Re-audit
4. Final audit (deployment verification)
5. Issuance of a public audit report

Deliverables:

Comprehensive code review
Official public audit report

Pre-Audit (Code Review)

Who it's for:

Projects with incomplete code still in development.
Projects lacking full documentation, tests, etc.

Process:

1. Interim audit with a list of recommendations for code improvement.

Deliverables:

Internal code review identifying potential attack vectors.
A list of recommendations and a to-do list to prepare for a comprehensive standard audit.
Accelerating project launch by identifying architectural issues early while reducing costs on future audits and contests through parallel security code reviews.

Security Audit Subscription

Who it's for:

Projects with a large, continuously evolving codebase.
Projects requiring ongoing support from a dedicated security team.

Process:

1. Standard Security Audit + Any Additional Services.

Deliverables:

Deployment script verification.
Existing test verification.
Development of additional tests for specific scenarios.
Verification of deployed contracts (e.g., checking all initialization parameters, migration to a new implementation of an upgradeable contract, etc.).
Monitoring system design and implementation.
Development of monitoring bots based on system design.
Validation of the project's financial model and risk assessment.
Execution of additional security research tasks requested by the customer to enhance overall system security, availability, and decentralization.

Security Research & Tech Advisory

Who it's for:

Projects seeking to implement new features or upgrade their protocols.

Process:

1. Defining the research goals and expected outcomes (e.g., designing a new protocol version, selecting the most secure algorithm, or modeling a new DeFi primitive).
2. Breaking the project into actionable phases and developing a go-to strategy.
3. Gathering relevant data, researching best practices in the given DeFi domain, and extracting actionable insights.
4. Preparing a comprehensive report detailing findings, insights, and recommendations and a GitHub repository containing scripts or resources created during the process.

Deliverables:

In-depth research on the project and the relevant DeFi domain.