99313 21789 95 33331 402 644242
195408 502417 8886
Banner Logo Watchdog

Technology-driven continuous auditing service

Book a demo
Watchdog
Crosshair

Adapts & Monitors

Code audits only examine a snapshot of the code, while vulnerabilities are not static and won’t wait for an audit. Protocols, state of chain and vulnerability body of knowledge evolve. This is why we created Watchdog. [Whitepaper]

Contract Library
Crosshair Circles

Scenarios for continuous auditing

Use case

Doppler Doppler

Protocol adds, updates contracts regularly

For example, multiple variations for different assets.

Circles


Use case

Doppler Doppler

Vulnerability depends on environment

For example, liquidity in a swap pool, initialization state of other contract, liveness of other contract, approvals or balances in tokens.

Circles


Use case

Doppler Doppler

New vulnerability pattern/attack vector discovered

“Am I vulnerable?”

Circles


Auditing

Doppler Doppler
227917 570 692190 75 31291 672 78109 1779

Dedicated auditor

Dedicated Auditor support levels start at 1 engineer-day per month

Monitored properties optimised in consultation with the auditors that conducted the original protocol audit

  • Study top reports every week, examine code, rank
  • Escalate to protocol developers as needed
  • Tune settings (analyses, assignment of contracts to protocols)
Book a demo
  • Study top reports every week, examine code, rank
  • Escalate to protocol developers as needed
  • Tune settings (analyses, assignment of contracts to protocols)
Circle

Author 211330 740109 91 156688 54 340538 851397 133603 9194 Circles Crosshair