Find the perfect audit solution for your protocol.

Protocols of any size and budget can find their ideal audit solution.

Get Started
Hyacinth

Why use
Hyacinth for
your audit?

Why use Hyacinth
for your audit?

Faster

Faster

At Hyacinth, audits are always done on your timeline. You get to pick your deadline, ensuring there will be no delay.

Faster

Affordable

Our suggested bounty prices are among the lowest rates in the industry. However, they are just suggestions; projects choose their own price when they post their bounty.

Faster

Higher Quality

You can review the auditors’ history, so you know exactly who you are working with.

Check out our most recent audits

Proven Track Record

40+ successful audits completed

All successfully coordinated through Hyacinth's platform.

Track

0 incidents reported post-audit

Hyacinth-audited projects have experienced no security breaches.

Track

100% client satisfaction

Protocols consistently highlight the quality of reports and communication.

Track

50+ top-tier auditors

Smart and non-smart contract audit experts — covering formal verification, penetration testing, key storage audits, Solidity, Rust, Cairo, and more.

Track

How does Hyacinth work?

How does
Hyacinth work?

1
Protocol mints NFT, deposits, and posts a bounty, retainer or an audit auction bid.
2
Qualified auditors can apply for bounties or retainers, and submit bids for audit biddings.
3
For bounties and retainers, protocols review applications. For audit biddings, they choose one based on submitted bids.
4
Audit begins (on-chain/off-chain).
5
Auditors review code and submit an audit report. Protocols fix any found errors or vulnerabilities.
Audit is completed, bounty or audit bidding is paid out. The protocol leaves the auditor feedback on-chain.

The first
on-chain peer-to-peer
auditing platform.

The first on-chain
peer-to-peer auditing
platform.

Faster

Inspire consumer confidence by receiving your audit on-chain and having your code locked during your audit.

Faster

Code is locked during the audit; the contract being audited can’t be interacted with, protecting retail funds in case a vulnerability has yet to be discovered.

Faster

Code is locked after the audit; the contract can’t be upgraded, removing a significant attack vector and ensuring that the code in the audit report exactly matches the deployed code.

In Web3, trust starts with real audits

No shortcuts. Clear process.
Zero hacks post-audit.

Track

I was initially hesitant to get any audit, and I talked to a lot of other people who told me "audits are scams"

But decided to try out Hyacinth audits anyways because some friends recommended them. And the experience was great! Other auditing firms were quoting me 2-3x what they were and way longer on time to completion. But Hyacinth got it done fast, and was very helpful answering questions and pushing things through so it all got done quickly and correctly!

Skely from Ponzimon, the founder of Ponzimon

Hyacinth is like Google for auditors.

The one that helps you find best-in-class boutiques that can deliver sharply, in time and - most of all - focusing on quality above all.

OxMop, the founder of Swappee
Track

I was initially hesitant to get any audit, and I talked to a lot of other people who told me "audits are scams"

But decided to try out Hyacinth audits anyways because some friends recommended them. And the experience was great! Other auditing firms were quoting me 2-3x what they were and way longer on time to completion. But Hyacinth got it done fast, and was very helpful answering questions and pushing things through so it all got done quickly and correctly!

Skely from Ponzimon, the founder of Ponzimon
Track

Hyacinth is like Google for auditors.

The one that helps you find best-in-class boutiques that can deliver sharply, in time and - most of all - focusing on quality above all.

OxMop, the founder of Swappee

Want to submit your own code for an audit?

Mint a Proof of Protocol NFT to begin posting bounties.

Get Started