Security audit
Smart contract security audit
Guardix audits the full repository — not isolated contract files. Connect GitHub, lock the exact branch and commit, and get validated findings with architecture context and shareable reports.
How it works
Architecture-first analysis. Multi-model validation.
The pipeline understands your system before looking for issues. Findings are validated across independent model perspectives — only high-confidence issues reach the report.
Architecture-first understanding
Maps contracts, invariants, assumptions, and design decisions before looking for vulnerabilities. Findings are grounded in what the system is supposed to do.
Broad parallel static analysis
Multiple independent model perspectives analyze the codebase in parallel — reentrancy, access control, oracle risks, logic errors, and more. Each runs its own analysis without seeing the others.
Multi-model consensus
Findings are cross-validated across models. Only issues with independent agreement and high confidence reach the final report — dramatically reducing false positives.
Exploit verification
Critical findings are tested against a forked mainnet chain. If the exploit executes, you know it's real — not a false positive. Automated, reproducible, verifiable.
Real findings
Prioritized findings with severity, code location, and validation confidence.
Every issue includes the exact file path, code snippet, severity assessment, and multi-model consensus — not vague descriptions of what could go wrong.
Unchecked external callback before balance update
Admin rotation bypasses role boundary
Invariant drift between queue state and accounting
Unchecked transfer return value hides failure
Total supply must equal sum of individual balances at all times
Threat if broken
Direct loss of depositor funds
Queue state transitions must be monotonic: pending → processing → done
Threat if broken
Double-processing of withdrawals
Oracle price feeds assumed fresh within 1-hour staleness window
Threat if broken
Incorrect liquidation at stale prices
Admin role changes cannot bypass timelock constraints
Threat if broken
Unauthorized privilege escalation
Architecture context
Findings grounded in invariants, assumptions, and design decisions.
The audit maps the system architecture first — contract relationships, state flows, and design boundaries. Findings reference this context, making them easier to trust and fix.
Reports & sharing
Versioned reports for engineers and stakeholders.
Share a versioned report link or export a PDF. Stakeholders see the same data engineers are reviewing — no separate deliverable, no translation layer.
stonevault/vault-core
share linkShare a versioned report that stays tied to the scan version — stakeholders see the same data engineers are reviewing.
First audit free. No credit card required.
Connect a GitHub repository, review validated findings, and share reports — all from one dashboard.