Securing the decentralized trustless future

At Oak Security, we offer security auditing and cyber security advisory services with a special focus on third-generation blockchains such as the Cosmos SDK and CosmWasm, Polkadot and Substrate, Solana, NEAR, and Flow (Cadence) ecosystems. We also serve Ethereum and EVM-compatible ecosystems through our brand Solidified.

Get a quote
interchain foundation logoLido Finance logocosmoswasm logofilecoin logoflow logoosmosis logonoble logocosmos hub logosei logostargaze logoDelphi Labs logoastroport logomars logolevanadao-daostride logoneutronnym logo
axelar logo
interchain foundation logoLido Finance logocosmoswasm logofilecoin logoflow logoosmosis logonoble logocosmos hub logosei logostargaze logoDelphi Labs logoastroport logomars logolevanadao-daostride logoneutronnym logo
axelar logo
Oak security in NUMBERS

Our stats speak volumes

security researchers
audits completed
Issues Discovered

Supported technologies

Cosmos SDK
Cosmowasm logo
substrate logo
ink logo
flow logo
solana logo
near logo

How we can support you

Our services cover all aspects of your software lifecycle, from early planning, secure design, economic consulting, secure development processes, over in-depth protocol reviews, secure use of cryptography and smart contract audits to on-going operational security.

Idea discovery
Security-first design
review & design
Economic consulting
Secure development consulting
Code reviews & penetration testing
Release management consulting
Operational security consulting
Get a quote
what we secure

Securing the digital frontier

Whitepapers, protocol design documents, economic models, governance models...
Layer 1
Node implementations, consensus protocols, cryptographic primitives...
Layer 2
Roll-up processors, cross-layer communication, settlement protocols…
Smart Contracts
Decentralized finance (DeFi), identity, governance protocols, DAOs...
DApps, wallets, bridges, data aggregation/indexing layers...

Rigorous & collaborative audit approach

Our process is designed to be thorough, diverse, and mixed. We employ a variety of techniques and perspectives to give you a 360 degree review of your project to maximize coverage and depth.


Each audit is done by 3+ auditors, who are chosen for their expertise in your industry. Cryptography projects will have a cryptography expert on the team, DeFi projects will have an economist on the team.


Your auditors will work independently to conduct an in-depth assessment of your code and project, utilizing static and manual code reviews, as well as approved testing and modeling methods.


The auditors will reveal their findings in a Consensus meeting, collaborate on open leads and put together the final report which will be shared with you.

Get a quote

Our team spans the whole globe

Calling on a team of 52+ expert auditors including Master’s and PhD holders, economists, cryptography experts, and experienced computer scientists, we are able to tailor our audits to provide you with the support you need.

Management team

Oak Security is the result of two domain experts in Computer Science and Economics getting together after years of collaborating to build a unique team to secure the new decentralized finance systems.

Dr. Stefan Beyer

Managing Director
Ph.D. in Computer Science
Has worked on Distributed Systems since 2004 (Pre-Bitcoin)
Blockchain security audits since 2018
More than 50 projects audited

Philip Stanislaus

Managing Director
MPhil Economics, Cambridge (UK)
Software engineer since 2007
Blockchain architect and developer since 2018
Web3 Experience: Dapper Labs/Flow, Polkadot/Web3 Foundation, Centrifuge

Request a quote

Thank you, we will get back to you as soon as possible.
Oops! Something went wrong while submitting the form.

Frequently asked questions

Can't find an answer here?
Drop us a message

Will an audit find all vulnerabilities?

During our audits, we employ several measures to maximize the likelihood of finding critical issues in the codebase and provide as much security as possible. Despite these efforts, there is always a possibility that we miss issues. Security audits should only be considered to be one component of your overall security strategy. A security review is no substitute for other best practices and should be accompanied by a security-focused design process, extensive unit, integration, and end-to-end testing, internal code reviews, bug bounties, secure development and development processes, as well as strictly followed operational security processes.

Whilst we would like to promise you a 100% hit rate, we believe no security company can make this claim.

How much does an audit cost?

It depends – we estimate the cost of each audit individually and provide a quote based on a number of factors, including the size of the codebase, its complexity, novelty, and the cost of the specialized team required for the specific project. Contact us here to request a quote, we will get back to you within one business day.

How is Oak Security different from other firms?

Oak Security uses a unique auditing process, based on blinded, independent reviews using a mix of methodologies. We staff at least 3 auditors on every audit, who work independently during the first phase of the project, initially not sharing their results. Each of the auditors follows their own methodology within our framework. This blinded approach has the advantage that auditors do not bias each other, whilst ensuring a wider breadth of techniques being applied. It also allows us to monitor the contributions of our auditors, which can be used to ensure high and consistent quality across projects.

After this initial phase, the auditors will share their findings in a consensus meeting and produce a report which lists issues encountered together with recommendations. The final version of our report is transparently published to our GitHub repository (

The selection of auditors for each project is performed in a unique manner. We assign at least 3 auditors with a background depending on a project's nature. For instance, a DeFi protocol with an economic model will have an auditor with a strong background in economics, and a ZK-rollup processor will have a cryptographer on the team. While all auditors are required to manually review all the code in the scope of the audit, we allow each auditor to add their own set of techniques. This may include economic modeling, if appropriate, writing tests for edge cases not covered by the included tests, and fuzz testing for parts of the system that are susceptible to different behavior under a large number of parameter combinations. We believe this freedom in methodologies leads to the best results, since auditors compete internally to find critical issues, and will choose the best tools to help them during this process.

How long does an audit take?

The timeline for each audit depends on the complexity of the project and will be provided with our initial quote on a case-by-case basis. Audits may take anything from 0.5 weeks for simple projects to 12 weeks for very complex projects. In most cases, the duration is between 1 and 2 weeks.

In addition to the duration of the audit itself, you should account for time to apply our recommendations. The verification of fixes for the issues is included in our audits. Our auditors remain available for 3 weeks after the initial report has been delivered for this process.

When should I request a quote?

We recommend reaching out as early as possible to avoid delays in case of longer lead times. We do not require a codebase that is ready for the audit when we create a quote.

As long as we receive a work-progress version together with a description of the functionality to be added, we can create an estimate of the effort and budget required. We also offer clients who do not have a finalized codebase blanket reservations that will be refined closer to the audit start date.

Can't find the answer here?
Drop us a message