Offensive Security. Web3-Native.

Smart contract audits from application layer to VM internals. Penetration testing, red team operations, and cryptographic primitive review — for teams building at the edge of what has been secured before.

// DEF CON · Infiltrate · 15 yrs offensive security · Web3 + Web2

audit.sol

audit in progress
15+

years offensive security

3

DEF CON & Infiltrate talks

5

L1/L2 cores audited

12+

chains audited

0

undisclosed critical findings

// chains audited

EthereumEVM
ArbitrumL2
OptimismOP Stack
BaseOP Stack
ZKsyncZK Rollup
PolygonZK / PoS
SolanaSVM
BNB ChainEVM
AvalancheEVM
CosmosIBC
TONL1
SuiMove VM

// where we’ve been

Infrastructure-depth security research.

Most auditors review application contracts. We have reviewed the VMs, bridges, consensus engines, and cryptographic primitives they run on.

// ZK & L2 infrastructure

ZK-SNARK Circuits & L2 Bridge Verification

Reviewed Linea’s L2 bridge for IFT — covering ZK-SNARK-friendly hash functions, circuit isolation, proof aggregation middleware, rollup-to-mainnet exit verification, fraud-proof state roots, and operator liveness constraints.

ZK-SNARKsCircuit IsolationProof AggregationRollup ExitFraud Proofs
// cross-chain & cosmos

IBC Routing, Cosmos SDK & Evmos Execution Layer

Audited Cosmos SDK modules, Evmos execution layer, IBC cross-chain routing, token port modules, and light-client relay logic at ZetaChain. Consensus fault detection and state transition analysis on TON, Solana, and Sui core implementations.

Cosmos SDKIBC RoutingLight ClientEvmosState Transitions
// VM internals & bridges

RSKj VM, Trie Structures & Two-Way Peg Security

DeFi protocols and L1/L2 infrastructure at RootStock — RSKj VM internals, trie structures, precompiled contracts, two-way peg bridge, gas-cost inflation vectors, and federated HSM-based signing infrastructure.

RSKj VMTrie StructuresTwo-Way PegFederated HSMGas Inflation
// cryptographic primitives

Noise Protocol, Key Exchange & Ratcheting

Secure code audits for Codex, Waku, Nomos, and Status Wallet in Rust, Nim, and JS — including cryptographic primitive review of Noise handshake protocols, ephemeral key exchange, and ratcheting behaviors.

Noise ProtocolEphemeral KeysRatchetingRustNim
// consensus & fork handling

Consensus Fault Detection on TON, Solana & Sui

Security audits of TON, Solana, and Sui core implementations — focusing on consensus fault detection, fork handling edge cases, and state transition serialization bugs at the protocol layer.

Consensus FaultsFork HandlingState SerializationSVMTVM
// custom tooling

Custom Slither Detectors & Formal Verification

We build the tooling, not just use it. Custom Slither detectors written for client-specific vulnerability classes, alongside Echidna, Medusa, Halmos, and Certora across EVM, Rust, and Cairo codebases.

Custom SlitherEchidnaMedusaHalmosCertora

// new attack surface

AI Security & AI × Web3

LLMs, autonomous agents, and on-chain AI systems are the next major attack surface. We bring offensive security research tradecraft to both sides of this stack.

AI Systems

Securing the AI Stack

Prompt injection. Jailbreaks. Data poisoning. RAG pipeline leakage. Agentic privilege escalation. We red team LLM systems using the same offensive mindset we bring to every engagement.

Prompt InjectionJailbreak TestingRAG AuditAI Agent Red TeamOWASP LLM Top 10MCP Security
AI × Web3

Where Both Worlds Collide

On-chain AI agents. LLM-integrated DeFi governance. AI oracle manipulation. We assess the full cross-stack risk surface where decentralized protocols embed AI components.

AI Oracle SecurityOn-chain AI AgentsLLM-Augmented AuditModel IntegrityAI Supply ChainCross-stack Threat Model

// how we work

A Rigorous Process. No Shortcuts.

Every engagement follows a battle-tested methodology — from scoping to final deliverable.

01

Scoping Call

We review your codebase, architecture docs, and threat model. We define scope, timeline, and commit hash.

02

Manual Review

Line-by-line analysis by an experienced security researcher. Logic flaws, access control, flash loan vectors, upgradeability risks — nothing is skipped.

03

Automated & Fuzzing

Custom tools developed by Viper, alongside industry standards: Aderyn (static analysis), Echidna/Medusa (property-based fuzzing), Halmos/Certora (formal verification where applicable).

04

Initial Report

Findings categorized by severity: Critical / High / Medium / Low / Informational. Each with PoC exploit where applicable.

05

Remediation Review

Your team implements fixes. We verify each mitigation and update finding status to Resolved or Acknowledged.

06

Final Report

Publishable PDF report delivered. Can be made public to signal security posture to your community.

// audit reports

We Publish Our Work

Transparency is a security signal. Where clients permit, we publish full audit reports — so the community can verify the work.

ZK-L2 Bridge Security Audit[Confidential]

Ethereum L22024-Q4

2 Critical · 2 High · 1 Medium

Under NDA

Cosmos SDK & IBC Cross-Chain Modules[Confidential]

Cosmos / EVM2024-Q2

2 Critical · 3 High · 2 Medium

Under NDA

RSKj VM & Two-Way Peg Bridge[Confidential]

Bitcoin / EVM2023-Q3

0 Critical · 2 High · 4 Medium · 3 Low

Under NDA

Ready to secure your protocol?

We work with a limited number of clients to maintain quality. Reach out early.

Start a Conversation