Coinspect will examine the provided source code to identify and attempt to exploit security vulnerabilities that might allow attackers to take control of the deployed contracts or perform any other unauthorized operation including funds theft and denial of service.
Our consultants will provide a final report that includes an executive summary, technical details, evidence that verifies the possibility of exploiting the vulnerabilities found, and the scope and severity of these vulnerabilities.
Coinspect helps us on a daily basis with everything related to the security of the software products we build, including training our developers to detect and avoid introducing vulnerabilities in an early stage of our software development lifecycle. Their team has the most proﬁcient and knowledgeable security experts I know in the space.
Coinspect did a security review for complex embedded code on our behalf and came back with workable exploits and improvement suggestions in a record time.
What saved us? It was caught in a security audit by Coinspect, I can't recommend this team highly enough for crypto specific security audits.