IS YOUR CODE SECURE?

We relentlessly detect complex vulnerabilities before they become your problem

HELPING TO SECURE

  • a Spark Horizontal Light Background RGB
  • b Origin
  • c olympus
  • d venus logo black
  • etherfi
  • lista

OUR SERVICES

SMART CONTRACTS AUDITS

we conduct a comprehensive review of your smart contract architecture, covering all logic flows and edge cases. we detect critical vulnerabilities others might miss. you'll receive a detailed audit report, along with expert guidance to implement fixes and optimize your contract

SECURITY CONSULTING

whether you're developing a new concept or refining an existing architecture, our team delivers strategic, actionable insights aligned with your goals. we assess your design, identify potential vulnerabilities, and help you build a clear, effective, and secure product

SECURITY TOOLING EVALUATION

we build advanced static analysis, deep learning, and llm-powered tools to detect vulnerabilities in smart contracts. our approach have uncovered critical flaws in contracts from top defi projects

WORKFLOW

[1]

Protocol analysis

[2]

Modular breakdown

we stay until the job is done

we stay until the job is done

[3]

Deep code assessment

[4]

Attack vector exploration

[5]

Weekly reports

[6]

Internal cross review

[7]

Reaudit & verification

[8]

Comprehensive final report

[1]

Protocol analysis

[2]

Modular breakdown

[3]

Deep code assessment

[4]

Attack vector exploration

[5]

Weekly reports

[6]

Internal cross review

[7]

Reaudit & verification

[8]

Comprehensive final report

ABOUT US

We are a small team of highly efficient researchers with a proven track record of securing projects.

You can expect complete coverage, advanced attack research, and good vibes along the way.

We specialise in:

> thorough audits

> sophisticated analysis tools

> security consulting

OUR UNIQUE TOOLS

STATIC ANALYZER

our static analysis tool enhances audits with automated security checks. it parses solidity code into a custom intermediate representation (ir) that captures the contract's structure and semantics. a pattern-based analysis engine then scans the ir against a comprehensive and continuously updated library of known vulnerabilities.

SimpleSwap.sol
File Edit View
...
function swapTokensForEth(uint256 tokenIn) external {
    require(token.transferFrom(msg.sender, address(this), tokenIn), "Transfer failed");
    uint256 ethOut = getAmountOut(tokenIn, tokenReserve, ethReserve);
    require(ethOut > 0, "Zero output");
    (bool ok, ) = msg.sender.call{value: ethOut}("");
    require(ok, "ETH transfer failed");
    tokenReserve += tokenIn;
    ethReserve -= ethOut;
}
...

Items found:

High risk: 3

Medium risk: 2

Low risk: 4

AI AUDIT AGENT

on top of our existing tooling, we leverage the power of llms for various tasks: crawling the entire codebase, breaking it into logical components, and identifying potential vulnerabilities. the model then researches each vulnerability's impact, performs a review, and generates a detailed report based on confirmed findings.

REVIEWS

“Unvariant has been an invaluable partner for our Spell reviews. They work fast and dig deeper than most of the other teams I’ve seen”

Lucas Manuel

CTO at Phoenix Labs

/ Spark

“Thanks for reviewing everything in such detail - seing infos and mediums about the tiniest things proves that you`re checking it all”

Nick Addison

Solidity Developer at Origin Protocol

After reviewing a bug we found: “Fascinating. I haven`t seen an attack like this before.”

David Hunt-Mateo

Senior Engineer at Request Network

BLOG

more posts

Is your code secure?

Fill out the form and we'll get back to you!