Skip to content

Exploit verification

Some workspaces have access to exploit verification — a feature that goes beyond static analysis and tries to show whether a vulnerability is exploitable in practice.

When enabled, Guardix runs a separate pipeline that:

  1. Prepares an isolated execution environment (sandbox) aligned with your contract’s chain context.
  2. Attempts exploit scenarios against the snapshot.
  3. Surfaces outcomes — for example, whether the issue was reproducible and what happened during the attempt.
  • Progress for exploit-related jobs
  • Logs (often redacted) for transparency without exposing secrets
  • Status of each attempt so you are not left with ambiguous empty states

Availability may be feature-gated and require a completed audit as a prerequisite.

Exploit verification is a strong signal, not a guarantee. A failed attempt does not always mean “safe,” and a succeeded attempt does not replace a full manual audit for your business context.