Our security assessment procedure
We provide a preliminary audit report, allowing customers to review and address any bugs or vulnerabilities we identify.
For code changes, we offer re-assessments, ensuring ongoing security. Each step is conducted by a team of over three experts.
Flash loan / Price manipulated attack testing
Here’s an example of a flash loan attack simulation using SCRL-selected tools. We leverage top-tier tools and continuously research to stay ahead.
Formal Verification
Our smart contract audits incorporate Formal Verification, a rigorous method that systematically examines the code’s functionality. This process verifies all logical aspects, including computations, state transitions, and potential mutations, ensuring the contract adheres to its intended behavior with mathematical precision.
Our Detector Engine
Our system includes over 1,000 vulnerability detectors, covering critical issues like Oracle Manipulation, Re-entrancy, and Lend & Borrow Re-entrancy. Additionally, we provide general informational warnings and gas optimization insights.
Support more library / compiler lang / infrastructure
We support Data Oracles, Compiler Languages, Infrastructure, Price Feeds, and more.
Our system includes error-checking mechanisms to ensure accurate external library calls, preventing issues caused by incorrect integrations.