Protect your smart contracts with AI + manual audits. Prevent exploits, boost investor trust & meet exchange listing requirements.
Billions in assets are locked in smart contracts, and one line of code can expose them to attackers.
CredShields blends AI-powered scans and expert manual reviews to deliver comprehensive audits trusted by leading Web3 protocols and exchanges.
You can count on us to monitor every stage of smart-contract development, from manual code review to automated testing. We leave no stones unturned to find security vulnerabilities during the audit. Upon completing the audit, our team provides a detailed report outlining the tests performed and the security issues identified, including best practices for improved security.
| S.No | Audit Category Checklist | |
|---|---|---|
| 1 |
SWC check list
|
|
|
Unencrypted Private Data On-Chain
|
||
|
Code With No Effects
|
||
|
Message call with hardcoded gas amount
|
||
|
Hash Collisions With Multiple Variable Length Arguments
|
||
|
Unexpected Ether balance
|
||
|
Presence of unused variables
|
||
|
Right-To-Left-Override control character (U+202E)
|
||
|
Typographical Error
|
||
|
DoS With Block Gas Limit
|
||
|
Arbitrary Jump with Function Type Variable
|
||
|
Insufficient Gas Griefing
|
||
|
Incorrect Inheritance Order
|
||
|
Write to Arbitrary Storage Location
|
||
|
Requirement Violation
|
||
|
Lack of Proper Signature Verification
|
||
|
Missing Protection against Signature Replay Attacks
|
||
|
Weak Sources of Randomness from Chain Attributes
|
||
|
Shadowing State Variables
|
||
|
Incorrect Constructor Name
|
||
|
Signature Malleability
|
||
|
Block values as a proxy for time
|
||
|
Authorization through tx.origin
|
||
|
Transaction Order Dependence
|
||
|
DoS with Failed Call
|
||
|
Delegatecall to Untrusted Callee
|
||
|
Idity Functions
|
||
|
Assert Violation
|
||
|
Uninitialized Storage Pointer
|
||
|
State Variable Default Visibility
|
||
|
Reentrancy
|
||
|
Unprotected SELFDESTRUCT Instruction
|
||
|
Unprotected Ether Withdrawal
|
||
|
Unchecked Call Return Value
|
||
|
Floating Pragma
|
||
|
Outdated Compiler Version
|
||
|
Integer Overflow and Underflow
|
||
|
Function Default Visibility
|
A DeFi protocol with $500M TVL prevented potential $20M loss after CredShields uncovered access control flaws pre-launch.