Securing the decentralized trustless future

At Oak Security, we offer security auditing and cyber security advisory services with a special focus on third-generation blockchains such as the Cosmos SDK and CosmWasm, Polkadot and Substrate, Solana, NEAR, and Flow (Cadence) ecosystems. We also serve Ethereum and EVM-compatible ecosystems through our brand Solidified.

Get a quote
interchain foundation logoLido Finance logocosmoswasm logofilecoin logoflow logoosmosis logonoble logocosmos hub logosei logostargaze logoDelphi Labs logoastroport logomars logolevanadao-daostride logoneutronnym logo
axelar logo
interchain foundation logoLido Finance logocosmoswasm logofilecoin logoflow logoosmosis logonoble logocosmos hub logosei logostargaze logoDelphi Labs logoastroport logomars logolevanadao-daostride logoneutronnym logo
axelar logo

"The team of @SecurityOak are unsung heros in the @CosmWasm ecosystem. Dedication, expertise and humbleness makes it pure joy working with them. The value they add by strengthening the framework behind the scenes makes them a SAFU gem for all of us."

Simon Warta

Co-Founder and Managing Director, Confio

Oak security in NUMBERS

Our stats speak volumes

47
security researchers
150+
audits completed
2000+
Issues Discovered

Unwavering security for every stage

Our signature product is a multi-layered audit, involving three or more independent security researchers with complementary skillsets performing an isolated and unbiased audit of your smart contracts. The final report lists all discovered vulnerabilities and suggested solutions approved by the consensus of auditors.

Get a quote
technologies

Supported technologies

Cosmos SDK
Cosmowasm logo
CosmWasm
substrate logo
Substrate
ink logo
ink!
flow logo
Flow
solana logo
Solana
near logo
NEAR
More
SERVICES

How we can support you

Our services cover all aspects of your software lifecycle, from early planning, secure design, economic consulting, secure development processes, over in-depth protocol reviews, secure use of cryptography and smart contract audits to on-going operational security.

Idea discovery
Security-first design
Protocol
review & design
Economic consulting
Secure development consulting
Code reviews & penetration testing
Release management consulting
Operational security consulting
Get a quote
what we secure

Securing the digital frontier

Architecture
Whitepapers, protocol design documents, economic models, governance models...
Layer 1
Node implementations, consensus protocols, cryptographic primitives...
Layer 2
Roll-up processors, cross-layer communication, settlement protocols…
Smart Contracts
Decentralized finance (DeFi), identity, governance protocols, DAOs...
Off-chain
DApps, wallets, bridges, data aggregation/indexing layers...

"The Oak Security team has been extremely helpful in streamlining the whole audit process for our grants projects and reducing their time to market on Osmosis. We’ve also received positive feedback from our grantees as they’ve told us Oak Security has been a pleasure to work with.”

Federico Daffina Minicucci

Steward of the Osmosis Grants Program, Reverie

audit PROCESS

Rigorous & collaborative audit approach

Our process is designed to be thorough, diverse, and mixed. We employ a variety of techniques and perspectives to give you a 360 degree review of your project to maximize coverage and depth.

01

Each audit is done by 3+ auditors, who are chosen for their expertise in your industry. Cryptography projects will have a cryptography expert on the team, DeFi projects will have an economist on the team.

02

Your auditors will work independently to conduct an in-depth assessment of your code and project, utilizing static and manual code reviews, as well as approved testing and modeling methods.

03

The auditors will reveal their findings in a Consensus meeting, collaborate on open leads and put together the final report which will be shared with you.

Get a quote

"We’ve worked with the Oak team extensively while launching and upgrading Noble. They have caught some subtle issues and have been a great partner in helping us ship quality secure products. We love working with the team too and have been recommending them to folks looking!"

Jack Zampolin

Founder and CEO, Strangelove

team

Our team spans the whole globe

Calling on a team of 45+ expert auditors including Master’s and PhD holders, economists, cryptography experts, and experienced computer scientists, we are able to tailor our audits to provide you with the support you need.

Management team

Oak Security is the result of two domain experts in Computer Science and Economics getting together after years of collaborating to build a unique team to secure the new decentralized finance systems.

Dr. Stefan Beyer

Managing Partner
Ph.D. in Computer Science
Has worked on Distributed Systems since 2004 (Pre-Bitcoin)
Blockchain security audits since 2018
More than 50 projects audited

Philip Stanislaus

Managing Partner
MPhil Economics, Cambridge (UK)
Software engineer since 2007
Blockchain architect and developer since 2018
Web3 Experience: Dapper Labs/Flow, Polkadot/Web3 Foundation, Centrifuge

"Oak Security's comprehensive audits of Sei Chain, CosmWasm bindings as well as modifications of both Cosmos SDK and Tendermint have been indispensable towards the journey to superior security for Sei. Their thorough and insightful approach has given an unparalleled sense of assurance in the solidity of Sei's systems. Oak Security's professionalism, expertise, and dedication have truly set them apart. Oak Security has our highest recommendation."

Jayendra Jog

Co-Founder, Sei Labs

Request a quote

Thank you, we will get back to you as soon as possible.
Oops! Something went wrong while submitting the form.

Frequently asked questions

Can't find an answer here?
Drop us a message

Will an audit find all vulnerabilities?

During our audits, we employ several measures to maximize the likelihood of finding critical issues in the codebase and provide as much security as possible. Despite these efforts, there is always a possibility that we miss issues. Security audits should only be considered to be one component of your overall security strategy. A security review is no substitute for other best practices and should be accompanied by a security-focused design process, extensive unit, integration, and end-to-end testing, internal code reviews, bug bounties, secure development and development processes, as well as strictly followed operational security processes.

Whilst we would like to promise you a 100% hit rate, we believe no security company can make this claim.

How much does an audit cost?

It depends – we estimate the cost of each audit individually and provide a quote based on a number of factors, including the size of the codebase, its complexity, novelty, and the cost of the specialized team required for the specific project. Contact us here to request a quote, we will get back to you within one business day.

How is Oak Security different from other firms?

Oak Security uses a unique auditing process, based on blinded, independent reviews using a mix of methodologies. We staff at least 3 auditors on every audit, who work independently during the first phase of the project, initially not sharing their results. Each of the auditors follows their own methodology within our framework. This blinded approach has the advantage that auditors do not bias each other, whilst ensuring a wider breadth of techniques being applied. It also allows us to monitor the contributions of our auditors, which can be used to ensure high and consistent quality across projects.

After this initial phase, the auditors will share their findings in a consensus meeting and produce a report which lists issues encountered together with recommendations. The final version of our report is transparently published to our GitHub repository (https://github.com/oak-security/audit-reports/).

The selection of auditors for each project is performed in a unique manner. We assign at least 3 auditors with a background depending on a project's nature. For instance, a DeFi protocol with an economic model will have an auditor with a strong background in economics, and a ZK-rollup processor will have a cryptographer on the team. While all auditors are required to manually review all the code in the scope of the audit, we allow each auditor to add their own set of techniques. This may include economic modeling, if appropriate, writing tests for edge cases not covered by the included tests, and fuzz testing for parts of the system that are susceptible to different behavior under a large number of parameter combinations. We believe this freedom in methodologies leads to the best results, since auditors compete internally to find critical issues, and will choose the best tools to help them during this process.

How long does an audit take?

The timeline for each audit depends on the complexity of the project and will be provided with our initial quote on a case-by-case basis. Audits may take anything from 0.5 weeks for simple projects to 12 weeks for very complex projects. In most cases, the duration is between 1 and 2 weeks.

In addition to the duration of the audit itself, you should account for time to apply our recommendations. The verification of fixes for the issues is included in our audits. Our auditors remain available for 3 weeks after the initial report has been delivered for this process.

When should I request a quote?

We recommend reaching out as early as possible to avoid delays in case of longer lead times. We do not require a codebase that is ready for the audit when we create a quote.

As long as we receive a work-progress version together with a description of the functionality to be added, we can create an estimate of the effort and budget required. We also offer clients who do not have a finalized codebase blanket reservations that will be refined closer to the audit start date.

Can't find the answer here?
Drop us a message