Securing the decentralized trustless future
At Oak Security, we offer security auditing and cyber security advisory services with a special focus on third-generation blockchains such as the Cosmos SDK and CosmWasm, Polkadot and Substrate, Solana, NEAR, and Flow (Cadence) ecosystems. We also serve Ethereum and EVM-compatible ecosystems through our brand Solidified.
Get a quoteOur stats speak volumes
Supported technologies
How we can support you
Our services cover all aspects of your software lifecycle, from early planning, secure design, economic consulting, secure development processes, in-depth protocol reviews, secure use of cryptography and smart contract audits to on-going operational security.
review & design
Securing the digital frontier
Rigorous & collaborative audit approach
Our process is designed to be thorough, diverse, and mixed. We employ a variety of techniques and perspectives to give you a 360 degree review of your project to maximize coverage and depth.
Each audit is done by 3+ auditors, who are chosen for their expertise in your industry. Cryptography projects will have a cryptography expert on the team, DeFi projects will have an economist on the team.
Your auditors will work independently to conduct an in-depth assessment of your code and project, utilizing static and manual code reviews, as well as approved testing and modeling methods.
The auditors will reveal their findings in a Consensus meeting, collaborate on open leads and put together the final report which will be shared with you.
Our team spans the whole globe
Calling on a team of 52+ expert auditors including Master’s and PhD holders, economists, cryptography experts, and experienced computer scientists, we are able to tailor our audits to provide you with the support you need.
Management team
Oak Security is the result of two domain experts in Computer Science and Economics getting together after years of collaborating to build a unique team to secure the new decentralized finance systems.
Request a quote
Frequently asked questions
Can't find an answer here?
Drop us a message
During our audits, we employ several measures to maximize the likelihood of finding critical issues in the codebase and provide as much security as possible. Despite these efforts, there is always a possibility that we miss issues. Security audits should only be considered to be one component of your overall security strategy. A security review is no substitute for other best practices and should be accompanied by a security-focused design process, extensive unit, integration, and end-to-end testing, internal code reviews, bug bounties, secure development and development processes, as well as strictly followed operational security processes.
Whilst we would like to promise you a 100% hit rate, we believe no security company can make this claim.
It depends – we estimate the cost of each audit individually and provide a quote based on a number of factors, including the size of the codebase, its complexity, novelty, and the cost of the specialized team required for the specific project. Contact us here to request a quote, we will get back to you within one business day.
Oak Security uses a unique auditing process, based on blinded, independent reviews using a mix of methodologies. We staff at least 3 auditors on every audit, who work independently during the first phase of the project, initially not sharing their results. Each of the auditors follows their own methodology within our framework. This blinded approach has the advantage that auditors do not bias each other, whilst ensuring a wider breadth of techniques being applied. It also allows us to monitor the contributions of our auditors, which can be used to ensure high and consistent quality across projects.
After this initial phase, the auditors will share their findings in a consensus meeting and produce a report which lists issues encountered together with recommendations. The final version of our report is transparently published to our GitHub repository (https://github.com/oak-security/audit-reports/).
The selection of auditors for each project is performed in a unique manner. We assign at least 3 auditors with a background depending on a project's nature. For instance, a DeFi protocol with an economic model will have an auditor with a strong background in economics, and a ZK-rollup processor will have a cryptographer on the team. While all auditors are required to manually review all the code in the scope of the audit, we allow each auditor to add their own set of techniques. This may include economic modeling, if appropriate, writing tests for edge cases not covered by the included tests, and fuzz testing for parts of the system that are susceptible to different behavior under a large number of parameter combinations. We believe this freedom in methodologies leads to the best results, since auditors compete internally to find critical issues, and will choose the best tools to help them during this process.
The timeline for each audit depends on the complexity of the project and will be provided with our initial quote on a case-by-case basis. Audits may take anything from 0.5 weeks for simple projects to 12 weeks for very complex projects. In most cases, the duration is between 1 and 2 weeks.
In addition to the duration of the audit itself, you should account for time to apply our recommendations. The verification of fixes for the issues is included in our audits. Our auditors remain available for 3 weeks after the initial report has been delivered for this process.
We recommend reaching out as early as possible to avoid delays in case of longer lead times. We do not require a codebase that is ready for the audit when we create a quote.
As long as we receive a work-progress version together with a description of the functionality to be added, we can create an estimate of the effort and budget required. We also offer blanket reservations to clients who do not have a finalized codebase that will be refined closer to the audit start date.
Can't find the answer here?
Drop us a message