Smart Contract Security Audit

The SlowMist security team has audited more than 1,500 well-known smart contracts, covering public blockchain platforms such as Ethereum and blockchains based on the Ethereum Virtual Machine (EVM), EOS, Fabric, Solana, Klaytn, Aptos. During these audits, we also discovered hundreds of high-risk and medium-risk vulnerabilities. SlowMist is the first Chinese company to enter the Etherscan smart contract security audit recommendation list. The audit report service has received recognition and appreciation from dozens of well-known exchanges, such as the Best Security Audit Partner award by OKX.

Contact Us

Processing Flow

Smart Contract Security Audit Program

Token Security Audit

Serial Number Audit Class Audit Subclass
1 Overflow Audit -
2 Race Conditions Audit -
3 Permission Vulnerability Audit Access Control Audit
Excessive Authority Audit
4 Security Design Audit External Module Safe Use Audit
Compiler Version Security Audit
Hard-coded Address Security Audit
Fallback Function Safe Use Audit
Show Coding Security Audit
Function Return Value Security Audit
Low-level Call Function Security Audit
5 Denial of Service Audit -
6 Gas Optimization Audit -
7 Design Logic Audit -
8 "False Top-up" Vulnerability Audit -
9 Malicious Event Log Audit -
10 Scoping and Declarations Audit -
11 Replay Attack Audit ECDSA's Signature Replay Audit
12 Uninitialized Storage Pointer Audit -
13 Arithmetic Accuracy Deviation Audit -
14 Non-privacy/Non-dark Coin Audit -

DeFi Security Audit

Serial Number Audit Class Audit Subclass
1 Overflow Audit -
2 Reentrancy Attack Audit -
3 Replay Attack Audit -
4 Flashloan Attack Audit -
5 Race Conditions Audit Reordering Attack Audit
6 Permission Vulnerability Audit Access Control Audit
Excessive Authority Audit
7 Security Design Audit External Module Safe Use Audit
Compiler Version Security Audit
Hard-coded Address Security Audit
Fallback Function Safe Use Audit
Show Coding Security Audit
Function Return Value Security Audit
External Call Function Security Audit
Block data Dependence Security Audit
tx.origin Authentication Security Audit
8 Denial of Service Audit -
9 Gas Optimization Audit -
10 Design Logic Audit -
11 Variable Coverage Vulnerability Audit -
12 "False Top-up" Vulnerability Audit -
13 Scoping and Declarations Audit -
14 Malicious Event Log Audit -
15 Arithmetic Accuracy Deviation Audit -
16 Uninitialized Storage Pointer Audit -

Move Security Audit

Serial Number Audit Class Audit Subclass
1 Overflow Audit -
2 Replay Attack Audit -
3 Flashloan Attack Audit -
4 Race Conditions Audit Reordering Attack Audit
5 Permission Vulnerability Audit Access Control Audit
Excessive Authority Audit
6 Safety Design Audit External Module Safe Use Audit
External Call Function Security Audit
Explicit Visibility of Functions Audit
Block data Dependence Security Audit
7 Denial of Service Audit -
8 Gas Optimization Audit -
9 Design Logic Audit -
10 Arithmetic Accuracy Deviation Audit -
11 Capability Safe Use Audit -
12 Resource Security Usage Audit -

Solana Security Audit

Serial Number Audit Class
1 Reentrancy Vulnerability
2 Replay Vulnerability
3 Reordering Vulnerability
4 Denial of Service Vulnerability
5 Race Conditions Vulnerability
6 Authority Control Vulnerability
7 Integer Overflow and Underflow Vulnerability
8 Arithmetic Accuracy Deviation Audit
9 Unsafe External Call Audit
10 Design Logic Audit
11 Scoping and Declarations Audit
12 Forged account attack Audit

EOS Security Audit

Serial Number Audit Class Audit Subclass
1 Overflow Audit -
2 Authority Control Audit Authority Vulnerability Audit
Authority Excessive Audit
3 Security Design Audit Hard-coded Audit
Show coding Audit
Abnormal check Audit
Type Security Audit
4 Denial of Service Audit -
5 Performance Optimization Audit -
6 Design Logic Audit -
7 False Notice Audit -
8 False Error Notification Audit -
9 Counterfeit Token Audit -
10 Random Number Security Audit -
11 Rollback Attack Audit -
12 Replay Attack Audit -

Security Research

Customer Sample

Back To Top