IS YOUR CODE SECURE?

We relentlessly detect complex vulnerabilities before they become your problem

HELPING TO SECURE

  • a Spark Horizontal Light Background RGB
  • b threshold
  • c olympus
  • d venus logo black
  • etherfi
  • lista

OUR SERVICES

SMART CONTRACTS AUDITS

we conduct a comprehensive review of your smart contract architecture, covering all logic flows and edge cases. we detect critical vulnerabilities others might miss. you'll receive a detailed audit report, along with expert guidance to implement fixes and optimize your contract

SECURITY CONSULTING

whether you're developing a new concept or refining an existing architecture, our team delivers strategic, actionable insights aligned with your goals. we assess your design, identify potential vulnerabilities, and help you build a clear, effective, and secure product

SECURITY TOOLING EVALUATION

we build advanced static analysis, deep learning, and llm-powered tools to detect vulnerabilities in smart contracts. our approach have uncovered critical flaws in contracts from top defi projects

WORKFLOW

[1]

Protocol analysis

[2]

Modular breakdown

we stay until the job is done

we stay until the job is done

[3]

Deep code assessment

[4]

Attack vector exploration

[5]

Weekly reports

[6]

Internal cross review

[7]

Reaudit & verification

[8]

Comprehensive final report

[1]

Protocol analysis

[2]

Modular breakdown

[3]

Deep code assessment

[4]

Attack vector exploration

[5]

Weekly reports

[6]

Internal cross review

[7]

Reaudit & verification

[8]

Comprehensive final report

ABOUT US

We are a small team of highly efficient researchers with a proven track record of securing projects.

You can expect complete coverage, advanced attack research, and good vibes along the way.

We specialise in:

> thorough audits

> sophisticated analysis tools

> security consulting

OUR UNIQUE TOOLS

STATIC ANALYZER

our static analysis tool enhances audits with automated security checks. it parses solidity code into a custom intermediate representation (ir) that captures the contract's structure and semantics. a pattern-based analysis engine then scans the ir against a comprehensive and continuously updated library of known vulnerabilities.

SimpleSwap.sol
File Edit View
...
function swapTokensForEth(uint256 tokenIn) external {
    require(token.transferFrom(msg.sender, address(this), tokenIn), "Transfer failed");
    uint256 ethOut = getAmountOut(tokenIn, tokenReserve, ethReserve);
    require(ethOut > 0, "Zero output");
    (bool ok, ) = msg.sender.call{value: ethOut}("");
    require(ok, "ETH transfer failed");
    tokenReserve += tokenIn;
    ethReserve -= ethOut;
}
...

Items found:

High risk: 3

Medium risk: 2

Low risk: 4

AI AUDIT AGENT

on top of our existing tooling, we leverage the power of llms for various tasks: crawling the entire codebase, breaking it into logical components, and identifying potential vulnerabilities. the model then researches each vulnerability's impact, performs a review, and generates a detailed report based on confirmed findings.

REVIEWS

“Unvariant team has been highly driven and accomodating, with dependably thorough reviews on multiple codebases of ours”

Lucas Manuel

CTO at Phoenix Labs

/ Spark

“I’m impressed by the level of attention Unvariant puts into their work.”

Danijel Gornjaković

Core contributor at Overtime

After reviewing a bug we found: “Fascinating. I haven`t seen an attack like this before.”

David Hunt-Mateo

Senior Engineer at Request Network

BLOG

more posts

Is your code secure?

Fill out the form and we'll get back to you!