Find the perfect audit solution for your protocol.

Protocols of any size and budget can find their ideal audit solution.

Get Started
Hyacinth

Why use
Hyacinth for
your audit?

Faster

Faster

At Hyacinth, audits are always done on your timeline. You get to pick your deadline, ensuring there will be no delay.

Faster

Affordable

Our suggested bounty prices are among the lowest rates in the industry. However, they are just suggestions; projects choose their own price when they post their bounty.

Faster

Higher Quality

You can review the auditors’ history, so you know exactly who you are working with.

How does Hyacinth work?

1
Protocol mints NFT, deposits, and posts bounty
2
Qualified auditors send request to interview for bounty
3
Protocols interview all interested auditors and pick up to 2 to complete the audit
4
Qualified auditors send requests to interview for the bounty
5
Auditors review code and submit an audit report. Protocols fix any found errors or vulnerabilities
Audit is completed, bounty is paid out. The protocol leaves the auditor feedback on-chain

The first
on-chain peer-to-peer
auditing platform

Faster

Inspire consumer confidence by receiving your audit on-chain and having your code locked during your audit.

Faster

Code is locked during the audit; the contract being audited can’t be interacted with, protecting retail funds in case a vulnerability has yet to be discovered

Faster

Code is locked after the audit; the contract can’t be upgraded, removing a significant attack vector and ensuring that the code in the audit report exactly matches the deployed code

Want to submit your own code for an audit?

Protect your users from the most dangerous vulnerabilities

Mint a protocol's NFT