Indisputable Quality with a Unique Approach to Every Case

Browse our security reports to see how we have applied our deep cybersecurity expertise to secure DeFi, Infrastructure, CeFi, L1/L2, and other industries.
These reports showcase the rigorous security evaluations and actionable insights we deliver to support innovation while fortifying industries against evolving threats.
[REPORTS]

[Fig. 01]

REPORTS

TESTIMONIALS

Hexens is a hidden gem. Their attention to detail is unmatched. We started working with them for a single project to test them out but loved them so much that we gave them two more projects before the first engagement even got completed. They actually care about security and customer experience.

Mudit Gupta

CTO

Highlights

Stealing ETH using discount factor bypass

Withdrawal proofs can be forged due to missing index bit size check

Missing constraint in PIL leading to proving fake inclusion in the SMT

Infinite voting power

Oracle DoS by depositing into a withdrawn validator

Locking and staking arbitrary amount of tokens without paying

Positive price movements of vault assets can be directly stolen through withdraw

Decimal precision oversight in cross-layer token transactions

We have a regular bounty of $20K USD for any critical bug found on audited scopes.

AUDIT REPORTS

/TYPE
/DATE
Show details

GET A QUOTE

Request a Quote

Get a Free Consultation on Security.

Please provide any information that can help us better understand your security needs.

Our team will contact you within one business day to outline the next steps and help you navigate your security challenges efficiently and smoothly.

Request a quote