HOW WE CONDUCT BLOCKCHAIN AUDIT
Get in touch with us to receive a free quotation of your blockchain project's audit - based on your white / yellowpaper. Our specialists will dig deeply into it to suggest the best solutions.
VERIFYING CONSENSUS ALGORITHMS
Blockchain applications are much more complex than simple smart contracts, we therefore put much more effort on verifying the consensus algorithms and nodes communication. We simulate them in practice (using test networks) and in theory (using ML models) so that we can easily find the bottlenecks that can allow hackers take over the network.
TESTING DIFFERENT ATTACK VECTORS
Our team consists of people with different competences, every of which is engaged in the audit of your project. We can therefore test the software from different angles, conducting penetration tests, checking cryptographic algorithms and simulating the application on test networks with different attack vectors.
We are in continuous contact with your team, using communication tools of your choice (Slack, Discord, WebTalk, you name it!) for quicker information flow. We inform you about the bugs and vulnerabilities found on the spot and suggest possible fixes. Once the fix is applied, we check it again for no additional costs!
BUSINESS LOGIC VALIDATION
If needed, our team can also verify the business logic of the blockchain network with assumptions received. Such measures will ensure the investors that the project can become a business success and will increase the probability of investment.
Penetration testing including stack / buffer / variable overflow, library dependencies
Communication testing, including MITM attacks, IP spoofing or table poisoning
Consensus algorithms weaknesses, including 51% attack, stake-bleeding, stake-grinding or malicious node operation
Overload attacks including DoS / DDoS and testing the network load with ML models
Verification of the basic blockhain functionalities, including staking, mining, minting, fee calculation, etc.
Cryptography analysis, including communication encoding, password and data hashing