Blockchain
Protocols
Scanning vulnerabilities for projects that are based
on the blockchain protocols such as Ethereum, BSC, Polygon, Avalanche,
Fantom, Solana, Heco, Arbitium, etc.
Private
Chains
Conducting code reviews and for enterprises products
and system that build based on private chain.
Permissioned
Chains
Including tests for projects that participated by
organizations and businesses, conduct tests in each node and scan for
vulnerabilities.
Web Desk
Mobile
Scanning vulnerabilities of applications, like Dapps,
Exchanges, Wallets, etc. Penetration testing will be included in the audit
process and the audit result will be given based on different conditions.
Code Reviewing
Auth
Lab will audit the code and check if all the functions are meeting the
requirement of the clients, such as oracles, market data tools, whale
alerts, etc. We also provide code revising services for our clients and help
them to get the tools ready to use.
Contact us about your audit demands, we will bring you a
free quote to starts with.
During this process, you will have the cost for the audit
and the time the whole process gonna taken.
We will conduct an audit process for your project and scan for the common vulnerabilities and sensitive functions that could cause asset change and the codes related to permissions. Various tools will be used in the non-production environment in order to simulate hacking and attacking in different situation.
After the first audit process has been done, we will prepare a feedback form for you with all the results related to the risks. It will include our revising recommendation for the code, and reminding about the super permissions and sensitive functions and authorizations.
The communication after revising, we will issue you an audit report including the final result. The audit report will also be uploaded to our server and we will make a post about the audit result on our community. Send us the logo of your project and we will include it in the post, it will be good for the marketing of the project..