35110 22830 63 39611 108 676008
242307 672210 6735
Banner Logo Watchdog

Technology-driven continuous auditing service

Book a demo
Watchdog

Adapts & Monitors

Code audits only examine a snapshot of the code, while vulnerabilities are not static and won’t wait for an audit. Protocols, state of chain and vulnerability body of knowledge evolve. This is why we created Watchdog.

Scenarios for continuous auditing

Use case

Protocol adds, updates contracts regularly

For example, multiple variations for different assets.



Use case

Vulnerability depends on environment

For example, liquidity in a swap pool, initialisation state of other contract, liveness of other contract, approvals or balances in tokens.



Use case

New vulnerability pattern/attack vector discovered

“Am I vulnerable?”



Auditing

129934 473 502561 280 30393 598 75025 2955

Dedicated auditor

Dedicated Auditor support levels start at 1 engineer-day per month

Monitored properties optimised in consultation with the auditors that conducted the original protocol audit

  • Study top reports every week, examine code, rank
  • Escalate to protocol developers as needed
  • Tune settings (analyses, assignment of contracts to protocols)
Book a demo
  • Study top reports every week, examine code, rank
  • Escalate to protocol developers as needed
  • Tune settings (analyses, assignment of contracts to protocols)


498548 769483 40 462716 36 244677 583200 392893 1687