Real-time
Security audits are only one piece of the puzzle. Policies to verify and protect your contract in real-time.
Universal
Harness the best of both worlds, your deep protocol expertise and our latest security research, to configure the best policies for your protocol.
Actionable
Detection built to be simple, low false positive, and engineered for the future world of prevention.
Modular
Start with monitoring guards and simulation, grow into prevention and on-chain verification
Secure the next generation of the web
For web3 to get into the hands of mainstream users, there cannot be exploits that steal millions of dollars in a single transaction.
TVL
~ 120B+
lost to hacks
~ $4B+
hacks every
~ 1.3 days
Backed by
Open source
result: attacker can view all code
Open state
result: attacker can choose the right moment
Open entry
result: attacker doesn't need to authenticate
Open exit
result: attacker can hack in single transaction
How does it work
Guards
Get the very best of offchain & onchain security techniques as verifiable policies: invariants, economic risks, anomalies
Monitor
With Guardrail as your security policy middlelayer, keep contracts simple and run security policies in real-time or in simulation
Prevent
Enforce your policies with prevention integration, proactively defending risky transactions rather than reacting after the fact