I perform manual Solidity smart contract security audits for EVM-compatible protocols — combining Slither and Aderyn static analysis with deep line-by-line review and Foundry fuzz testing for high-value engagements.
Vulnerability scope: reentrancy (single, cross-function, cross-contract); access control (missing modifiers, tx.origin, function visibility); integer overflow/underflow; flash loan attack vectors; price oracle manipulation (TWAP bypass, spot price reliance); front-running and MEV exposure; denial of service; signature replay; storage collision in upgradeable contracts; and initializer issues in proxy patterns.
Every critical and high finding includes a PoC demonstrating exploitability. The audit report is structured for dual audiences: executive summary for investors and non-technical leadership, technical detail for your engineering team.
Deliverables: full audit report, static analysis output, severity-rated findings with recommended fixes, and a recheck pass confirming remediations are correctly implemented.
Share your repository, protocol documentation, and deployment target. All findings stay confidential until you're ready to disclose.