VERIFICATION
The engine takes a contract address, fetches the deployed bytecode, and traces every reachable execution path to its consequences. This page covers what it detects, what the report contains, and what a verification costs.
WHAT WE DETECT
Five detection categories, each derived from structural analysis of the deployed contract across 18,966 unique bytecodes in the ongoing research dataset.
A function that sends ETH or calls an external contract before updating its own state, allowing the recipient to call back into the same function and drain funds before the balance is written. The engine also detects whether a reentrancy guard is present, distinguishing genuinely exposed paths from mitigated ones.
A function that calls another contract and ignores whether the call succeeded or failed, which means transfers can fail silently and leave the contract in an inconsistent state with no revert.
A function that modifies contract storage on a path with no access control check. The engine distinguishes between mapping-based writes (like balance updates that operate on the caller's own data) and writes to global state, providing context for whether the pattern is intentional or a gap.
A function that delegates execution to an external address while preserving the caller's storage context. If the target is attacker-controlled, the entire contract can be overwritten. For proxy contracts, the engine can resolve the implementation address and analyze the actual logic behind the forwarder.
A contract that exposes privileged operations to any caller, where functions that should be restricted to an owner or governance address execute without checking who initiated the transaction.
THE REPORT
Every verification produces a standalone HTML file that opens in any browser, works offline, and belongs to your team permanently. Inside: an executive summary, per-finding analysis with educational context, a remediation roadmap, function-by-function breakdown with resolved function names, storage slot map, and access control matrix.
Every finding traces to specific opcodes and execution paths in the bytecode. The report is yours permanently — archive it, share it, or attach it to a governance proposal.
$55,555
Per verification. Everything included.