Protect your smart contracts with AI + manual audits. Prevent exploits, boost investor trust & meet exchange listing requirements.
Billions in assets are locked in smart contracts, and one line of code can expose them to attackers.
CredShields blends AI-powered scans and expert manual reviews to deliver comprehensive audits trusted by leading Web3 protocols and exchanges.
You can count on us to monitor every stage of smart-contract development, from manual code review to automated testing. We leave no stones unturned to find security vulnerabilities during the audit. Upon completing the audit, our team provides a detailed report outlining the tests performed and the security issues identified, including best practices for improved security.
S.No | Audit Category Checklist | |
---|---|---|
1 |
SWC check list
|
|
Unencrypted Private Data On-Chain
|
||
Code With No Effects
|
||
Message call with hardcoded gas amount
|
||
Hash Collisions With Multiple Variable Length Arguments
|
||
Unexpected Ether balance
|
||
Presence of unused variables
|
||
Right-To-Left-Override control character (U+202E)
|
||
Typographical Error
|
||
DoS With Block Gas Limit
|
||
Arbitrary Jump with Function Type Variable
|
||
Insufficient Gas Griefing
|
||
Incorrect Inheritance Order
|
||
Write to Arbitrary Storage Location
|
||
Requirement Violation
|
||
Lack of Proper Signature Verification
|
||
Missing Protection against Signature Replay Attacks
|
||
Weak Sources of Randomness from Chain Attributes
|
||
Shadowing State Variables
|
||
Incorrect Constructor Name
|
||
Signature Malleability
|
||
Block values as a proxy for time
|
||
Authorization through tx.origin
|
||
Transaction Order Dependence
|
||
DoS with Failed Call
|
||
Delegatecall to Untrusted Callee
|
||
Idity Functions
|
||
Assert Violation
|
||
Uninitialized Storage Pointer
|
||
State Variable Default Visibility
|
||
Reentrancy
|
||
Unprotected SELFDESTRUCT Instruction
|
||
Unprotected Ether Withdrawal
|
||
Unchecked Call Return Value
|
||
Floating Pragma
|
||
Outdated Compiler Version
|
||
Integer Overflow and Underflow
|
||
Function Default Visibility
|
A DeFi protocol with $500M TVL prevented potential $20M loss after CredShields uncovered access control flaws pre-launch.