I perform DeFi-specialist security reviews covering the economic attack surfaces that standard smart contract audits frequently miss — flash loan composability, oracle manipulation, MEV exposure, and governance hijacking.
Protocol types covered: automated market makers (invariant violations, price manipulation via imbalanced liquidity); lending protocols (liquidation mechanics, bad debt, borrow/supply rate manipulation); yield vaults (share price inflation attacks, deposit/withdrawal front-running); bridges (cross-chain message validation, replay attacks, trust model analysis); and governance systems (vote buying, proposal hijacking, timelock bypass).
Each critical and high finding includes an economic attack scenario with approximate maximum extractable value — not just a code-level finding. This framing helps teams prioritise remediations by actual financial risk rather than theoretical severity.
Foundry or Echidna fuzz testing available for invariant verification — particularly important for AMM price invariants and vault accounting correctness.
Share your repository, protocol documentation, external integrations list (oracles, DEX routers, lending protocols), and any prior audit reports.