Home Security Audits Scanner Case Studies API Chat Request Audit
◆ Security Research

Case Studies

Real vulnerabilities found in production protocols. Every finding below was responsibly disclosed and represents real-world impact prevented by our audit methodology.

15+
Protocols Audited
4
Critical Findings
$300K+
Protected Assets
100%
Responsible Disclosure

Vulnerabilities we caught before attackers did.

Each case study is anonymized. Protocol names and exact exploit paths are withheld per responsible disclosure policy.

CASE 001
Critical
DeFi Marketplace Signature Bypass
Identified a critical vulnerability in a major gaming and metaverse protocol's NFT marketplace. The EIP-712 signature validation contained a gap that allowed an attacker to construct valid-looking signatures for unauthorized token operations, effectively enabling token multiplication through crafted transactions.
Potential Impact $200K+
Protocol Type NFT Marketplace / Gaming
Technique Manual Code Review + Automated Pattern Matching
EIP-712 Signature Validation Solidity DeFi
CASE 002
High
Cross-Chain Bridge Return Value Vulnerability
Discovered a silent failure mode in a protocol's LayerZero OFT (Omnichain Fungible Token) implementation. The send() function returned zero-initialized structs instead of proper messaging data, causing cross-chain messages to silently fail without reverting. Tokens could be burned on the source chain with no guarantee of arrival on the destination chain.
Potential Impact Cross-chain message loss
Protocol Type Cross-Chain Bridge / OFT
Technique Interface Compliance Analysis
LayerZero Cross-Chain Return Values OFT
CASE 003
High
Order Fill Tracking Bypass
Found that orders created with a zero-value salt could completely bypass the protocol's fill tracking mechanism. This meant an attacker could execute the same order repeatedly without the system recognizing prior fills, enabling essentially infinite order execution. The marketplace's integrity guarantees were entirely circumvented for these specially crafted orders.
Potential Impact Marketplace integrity compromise
Protocol Type DEX / Order Book
Technique Edge Case Analysis + Invariant Testing
Order Book Fill Tracking Edge Cases DeFi
CASE 004
High
Router Swap Calculation Error
Identified a critical logic error in a DEX router where the getAmountIn function was internally calling getAmountOut logic instead of performing the correct inverse calculation. Every swap routed through this function would compute incorrect token amounts, leading to direct fund loss for users on every single trade.
Potential Impact User fund loss on every swap
Protocol Type DEX / AMM Router
Technique Mathematical Verification + Code Tracing
AMM Router Logic Price Calculation Solidity

How we find what others miss.

Our audit process combines manual expert review with automated tooling to maximize coverage and minimize false negatives.

1

Architecture Review

Map the entire contract system: inheritance trees, state variables, access control, and inter-contract dependencies.

2

Automated Scanning

Custom pattern matching against 20+ vulnerability classes: reentrancy, oracle manipulation, access control, and more.

3

Manual Review

Line-by-line expert analysis of business logic, edge cases, mathematical invariants, and cross-function interactions.

4

Report & Remediation

Detailed findings with severity ratings, proof-of-concept scenarios, and specific code-level remediation guidance.

What we audit.

DeFi Protocols

AMMs, lending platforms, yield aggregators, staking contracts, governance systems, and tokenomics.

NFT & Marketplace

Marketplace contracts, royalty enforcement, auction mechanisms, signature validation, and order fulfillment.

Cross-Chain & Bridges

LayerZero integrations, bridge contracts, omnichain tokens, message passing, and relay validation.

Get Your Protocol Audited

Whether you're pre-launch or already deployed, our audit process finds vulnerabilities before attackers do. Start with a free scan or get a full audit quote.

or email directly: [email protected]