Covers 10+ mainstream chains
Our research team is familiar with the smart contract protocols of major mainstream public chains, provides industry-leading auditing services, adopts advanced technical methods and tools, and has audited the codes of 1000+ smart contracts, and obtained customer's Widely acclaimed and trusted.

Service Content

We provide our clients with industry-leading security auditing services using a combination of static analysis, automated tools and a robust manual review process

Relying on the team's years of experience and ability accumulation in blockchain security research, Chuangyu Blockchain Security Lab has summarized the most comprehensive smart contract security audit checklist on the market, covering 5 major categories of super 100 kinds of problems and defects. Our audits not only find security issues, but also recommend corrective actions to ensure they are properly fixed.

Code Specifications

For example, the encoder version is outdated, does not follow the constructor, return, event standards, common problems such as false recharge

Design flaw

For example, authorization function competition, loop consumption, loop security risks, etc.

Encoding Security

For example, arithmetic overflow, casting overflow, reentrancy vulnerability, call injection, permission control and other problems that are easily attacked

Coding Design

Check key function points, such as address initialization, transfer, balance judgment, external calls and other design defects

Encoding problem

Code-level line-by-line checks, such as syntax features, data privacy and reliability, logging, gas consumption optimization, permissions, etc.

Smart Contract Security Audit

Hackers use vulnerabilities to invade the system and cause huge losses to smart contract users

Security Risk

Privacy leak

Smart contracts are visible to all users on the blockchain, including but not limited to resources marked as private, or may cause privacy information leakage.

Transaction overflow and exception

Due to the constraints of the smart contract itself, such as conditional competition, transaction sequence dependence, etc., transaction overflows and exceptions are caused.

Contract failure

Abnormal behaviors caused by unreasonable fault handling mechanisms that may exist in the smart contract code.

Denial of service

The risk of denial of service due to various reasons.


Function visibility audit

Sensitive functions inherit permission detection and function call permission detection.

Contract restrictions bypass review

To invalidate the contract and delete the address code.

Call stack exhaustion audit

Check the stack height limit, whether the stack is exhausted.

Denial of service review

Too many requests result in contract denial of service.

Service Advantage

He has pre-researched more than one hundred smart contract applications, is familiar with the code writing rules of various smart contracts, and can accurately find code-level vulnerabilities.

The professional security research team has accumulated for a long time and is committed to the research of blockchain security ecology.

Good project quality control, strict control of project links, safety experts online throughout the process, answering user questions in real time.