
Indisputable Quality with a Unique Approach to Every Case
Browse our security reports to see how we have applied our deep cybersecurity expertise to secure DeFi, Infrastructure, CeFi, L1/L2, and other industries.
These reports showcase the rigorous security evaluations and actionable insights we deliver to support innovation while fortifying industries against evolving threats.
[REPORTS]
[Fig. 01]

TESTIMONIALS
Hexens is a hidden gem. Their attention to detail is unmatched. We started working with them for a single project to test them out but loved them so much that we gave them two more projects before the first engagement even got completed. They actually care about security and customer experience.
Highlights
Stealing ETH using discount factor bypass
Learn more
Withdrawal proofs can be forged due to missing index bit size check
Learn more
Missing constraint in PIL leading to proving fake inclusion in the SMT
Learn more
Infinite voting power
Learn more
Oracle DoS by depositing into a withdrawn validator
Learn more
Locking and staking arbitrary amount of tokens without paying
Learn more
Positive price movements of vault assets can be directly stolen through withdraw
Learn more
Decimal precision oversight in cross-layer token transactions
Learn more
AUDIT REPORTS
GET A QUOTE
Request a Quote
Get a Free Consultation on Security.
Please provide any information that can help us better understand your security needs.
Our team will contact you within one business day to outline the next steps and help you navigate your security challenges efficiently and smoothly.
