Indisputable quality and unique approach to every case

Here you can find security reports where we’ve applied our deep expertise in cybersecurity to help secure leading projects like Polygon, 1inch, EigenLayer, Risc ZERO, and others.
These reports showcase the rigorous security evaluations and actionable insights we deliver to support innovation while fortifying the decentralized ecosystem against evolving threats.
[REPORTS]

[Fig. 01]

REPORTS

TESTIMONIALS

Hexens is a hidden gem. Their attention to detail is unmatched. We started working with them for a single project to test them out but loved them so much that we gave them two more projects before the first engagement even got completed. They actually care about security and customer experience.

Mudit Gupta

CISO

Highlights

Critical VULNERABILITY

Stealing ETH using discount factor bypass

Critical VULNERABILITY

Withdrawal proofs can be forged due to missing index bit size check

Critical VULNERABILITY

Missing constraint in PIL leading to proving fake inclusion in the SMT

Critical VULNERABILITY

Infinite voting power

HIGH VULNERABILITY

Oracle DoS by depositing into a withdrawn validator

Critical VULNERABILITY

Locking and staking arbitrary amount of tokens without paying

HIGH VULNERABILITY

Positive price movements of vault assets can be directly stolen through withdraw

HIGH VULNERABILITY

Decimal precision oversight in cross-layer token transactions

We have a regular bounty of $20K USD for any critical bug found on audited scopes.

AUDIT REPORTS

GET A QUOTE

Don’t know where to start?
Drop us a message.