Traditional audit workflows have a frustrating gap between finding issues and verifying fixes. You receive a report, fix the flagged issues, then either trust that the fixes are correct or pay for another engagement to verify them. There’s no tight feedback loop.
Guardix treats audit runs as immutable, versioned snapshots. Each run is tied to a specific commit SHA, and the full history is preserved. When you fix an issue and re-audit, the new version shows exactly what changed — which findings were resolved, which persist, and whether new issues appeared.
How scan versions work
Every audit run creates a new scan version with its own set of findings, architecture artifacts, and severity counts. Versions are comparable — you can see the delta between any two runs.
v1 (initial audit) → 1 critical · 5 high · 8 medium
v2 (after fix) → 1 critical · 3 high · 7 medium
v3 (after second fix) → 0 critical · 2 high · 6 medium Each version is immutable. You can’t edit or delete a past scan — it’s a permanent record of the codebase’s security state at that point in time. This matters for teams that need to demonstrate due diligence to partners, investors, or protocol governance.
The fix-and-verify loop
- Run initial audit on your target branch and commit
- Review validated findings in the dashboard, prioritized by severity
- Fix the issues in your codebase and push to a new commit
- Re-run the audit — new scan version shows the delta
- Repeat until the security posture meets your threshold
Because re-audits run in hours and don’t require a new engagement, the feedback loop is tight enough to integrate into a normal development cycle. Fix a reentrancy issue, re-audit within hours, confirm it’s resolved, move on.
Reports are shareable at any version. Send stakeholders a link to the latest scan, and they see the same validated findings and architecture context that your engineering team is reviewing.
From gate to practice
The goal is to make security review feel like running tests, not like scheduling a consultant. Commit, audit, review, fix, repeat. The audit history grows with your codebase, and every version is a verifiable checkpoint.
We think this is how security review should work for teams that ship continuously. Not a one-time gate before mainnet, but a running practice that catches regressions early and builds confidence with every iteration.