Exploit verification
Some workspaces have access to exploit verification — a feature that goes beyond static analysis and tries to show whether a vulnerability is exploitable in practice.
Concept
Section titled “Concept”When enabled, Guardix runs a separate pipeline that:
- Prepares an isolated execution environment (sandbox) aligned with your contract’s chain context.
- Attempts exploit scenarios against the snapshot.
- Surfaces outcomes — for example, whether the issue was reproducible and what happened during the attempt.
What you see
Section titled “What you see”- Progress for exploit-related jobs
- Logs (often redacted) for transparency without exposing secrets
- Status of each attempt so you are not left with ambiguous empty states
Availability may be feature-gated and require a completed audit as a prerequisite.
Framing
Section titled “Framing”Exploit verification is a strong signal, not a guarantee. A failed attempt does not always mean “safe,” and a succeeded attempt does not replace a full manual audit for your business context.