Web3 security sleuth who thrives on outsmarting blackhat hackers, armed with a knack for spotting critical bugs and weak spots.
Our team can assist with project requirements, timeline coordination, and finding the perfect match
Detailed audit history and technical expertise
📧 Get a Quote • 🌐 Visit Website • 📚 Read Docs • 🐦 Follow Us
contests/ – Finalized reports from open auditing contests (Code4rena, Sherlock, CodeHawks).private audits/ – Reports from private client engagements conducted under NDA or direct contracts.| Badge | Meaning |
|---|---|
| Critical / High severity* | |
| Medium severity | |
| Low severity | |
| Informational severity | |
| Gas optimization |
Note: Chain Defenders classifies all Critical and High findings under a single High severity label.
Our competitive audit performance demonstrates our ability to find critical vulnerabilities that others miss. We consistently rank in the top 10 across major platforms, proving our expertise in real-world competitive environments.
| Protocol | Audit Platform | Contest Page | Report Page | Rank | Findings | Tech | Platform |
|---|---|---|---|---|---|---|---|
| Phi | Code4rena | 🔍 View Contest | 🛡️ View Report | 2nd | |||
| Swan | CodeHawks | 🔍 View Contest | 🛡️ View Report | 2nd | |||
| Tokensoft | Sherlock | 🔍 View Contest | 🛡️ View Report | 2nd | |||
| Usual | Sherlock | 🔍 View Contest | 🛡️ View Report | 2nd | |||
| Lambo.win | Code4rena | 🔍 View Contest | 🛡️ View Report | 4th | |||
| Teller | Sherlock | 🔍 View Contest | 🛡️ View Report | 5th | |||
| Soon | Cantina | 🔍 View Contest | Private | 5th | |||
| Zaros | CodeHawks | 🔍 View Contest | 🛡️ View Report | 6th | |||
| SecondSwap | Code4rena | 🔍 View Contest | 🛡️ View Report | 8th | |||
| stake.link | CodeHawks | 🔍 View Contest | 🛡️ View Report | 10th | |||
| IQ AI | Code4rena | 🔍 View Contest | 🛡️ View Report | 10th | |||
| Liquid Ron | Code4rena | 🔍 View Contest | 🛡️ View Report | 10th | |||
| THORWallet | Code4rena | 🔍 View Contest | 🛡️ View Report | 10th | |||
| Reserve | Cantina | 🔍 View Contest | Private | 12th | |||
| QuantAMM | CodeHawks | 🔍 View Contest | 🛡️ View Report | 21st | |||
| Total findings |
Trusted by leading protocols and security firms for confidential audits. Our private engagements showcase our ability to work with high-profile clients and deliver results that exceed expectations.
| Protocol | Report Page | Date | Findings | Tech | Platform |
|---|---|---|---|---|---|
| Phi | 🛡️ View Report | Nov 2024 | |||
| Size Credit | 🛡️ View Report | Dec 2024 | |||
| Cyfrin Attester | 🛡️ View Report | Mar 2025 | |||
| Blackhole Experiment | 🛡️ View Report | Mar 2025 | |||
| Cyfrin x EulerSwap | 🛡️ View Report | May 2025 | |||
| Cyfrin x Suzaku Core | 🛡️ View Report | May 2025 | |||
| Phi Token | 🛡️ View Report | June 2025 | |||
| Phi Staking | 🛡️ View Report | June 2025 | |||
| Cyfrin x Securitize On-Off Ramp & Bridge | 🛡️ View Report | July 2025 | |||
| Cyfrin x Symbiotic | 🛡️ View Report | July 2025 | |||
| Cyfrin x Licredity | 🛡️ View Report | August 2025 | |||
| AddictedDotFun | 🛡️ View Report | August 2025 | |||
| AddictedDotFun Enhancement | 🛡️ View Report | September 2025 | |||
| Cyfrin x Illuvium | 🛡️ View Report | September 2025 | |||
| Cyfrin x Button | 🛡️ View Report | September 2025 | |||
| BitVault | 🛡️ View Report | September 2025 | |||
| Sablier Staking | TBA | September 2025 | TBA | ||
| Cyfrin x BenQi | 🛡️ View Report | October 2025 | |||
| AddictedDotFun S2 | 🛡️ View Report | October 2025 | |||
| Cyfrin x Linea | TBA | November 2025 | TBA | TBA | |
| RacerDotFun | 🛡️ View Report | November 2025 | |||
| Cyfrin x STBL | TBA | December 2025 | TBA | TBA | |
| Total findings |
A pre-audit review is designed to prepare your project for a full audit. This early stage review identifies structural weaknesses and common pitfalls so you can streamline the official audit process — saving both time and cost.
A security audit is the cornerstone of trust in Web3. We conduct in-depth, end-to-end reviews of smart contracts, protocols, and blockchain infrastructure to detect vulnerabilities before they can be exploited.
Security and functionality go hand in hand. Our development services help teams design and implement scalable, secure, and production-ready smart contracts and protocols.
Fuzzing is one of the most effective ways to uncover edge-case vulnerabilities that traditional testing misses. We simulate adversarial inputs, unexpected states, and long-tail execution paths to stress-test protocols.
| Metric | Value |
|---|---|
| 🏆 Contest Rankings | Top 10 in 10+ contests |
| 🔍 Total Findings | 300+ vulnerabilities discovered |
| ⚡ Critical/High | 50+ high-severity issues found |
| 🌐 Chains Supported | EVM, HyperEVM, SVM |
| 🤝 Private Clients | 20+ successful engagements |
| 📝 Lines Reviewed | 100,000+ lines of code |
Made with ❤️ by Chain Defenders | Protecting Web3, One Audit at a Time
