Code audits only examine a snapshot of the code, while vulnerabilities are not static and won’t wait for an audit. Protocols, state of chain and vulnerability body of knowledge evolve. This is why we created Watchdog. [Whitepaper]
deployment of new contracts associated with a protocol
100s of custom security analyses
explorer database optimized for security
state and combines it with code information
warnings for inspection by a human auditor
to the requirements of the protocol, based on human input
For example, multiple variations for different assets.
For example, liquidity in a swap pool, initialization state of other contract, liveness of other contract, approvals or balances in tokens.
“Am I vulnerable?”
Monitored properties optimised in consultation with the auditors that conducted the original protocol audit