Five detection categories, each derived from structural analysis of the deployed contract across 18,966 unique bytecodes in the ongoing research dataset.

Reentrancy

A function that sends ETH or calls an external contract before updating its own state, allowing the recipient to call back into the same function and drain funds before the balance is written. The engine also detects whether a reentrancy guard is present, distinguishing genuinely exposed paths from mitigated ones.

Unchecked External Calls

A function that calls another contract and ignores whether the call succeeded or failed, which means transfers can fail silently and leave the contract in an inconsistent state with no revert.

Unprotected Storage Writes

A function that modifies contract storage on a path with no access control check. The engine distinguishes between mapping-based writes (like balance updates that operate on the caller's own data) and writes to global state, providing context for whether the pattern is intentional or a gap.

Delegatecall Exposure

A function that delegates execution to an external address while preserving the caller's storage context. If the target is attacker-controlled, the entire contract can be overwritten. For proxy contracts, the engine can resolve the implementation address and analyze the actual logic behind the forwarder.

Access Control Gaps

A contract that exposes privileged operations to any caller, where functions that should be restricted to an owner or governance address execute without checking who initiated the transaction.

Every verification produces a standalone HTML file that opens in any browser, works offline, and belongs to your team permanently. Inside: an executive summary, per-finding analysis with educational context, a remediation roadmap, function-by-function breakdown with resolved function names, storage slot map, and access control matrix.

Every finding traces to specific opcodes and execution paths in the bytecode. The report is yours permanently — archive it, share it, or attach it to a governance proposal.

$55,555

Per verification. Everything included.

  • Any deployed contract on any EVM-compatible chain
  • Three-level analysis: opcode profiling, control flow reconstruction, and symbolic execution
  • Standalone HTML report with findings, remediation roadmap, and function-by-function breakdown
  • Delivery in as little as 14 hours, up to 14 days depending on complexity
  • Direct line to the verification team
REQUEST VERIFICATION
REQUEST VERIFICATION