Find the perfect audit solution for your protocol.

Protocols of any size and budget can find their ideal audit solution.

Get Started
Hyacinth

Why use
Hyacinth for
your audit?

Why use Hyacinth
for your audit?

Faster

Faster

At Hyacinth, audits are always done on your timeline. You get to pick your deadline, ensuring there will be no delay.

Faster

Affordable

Our suggested bounty prices are among the lowest rates in the industry. However, they are just suggestions; projects choose their own price when they post their bounty.

Faster

Higher Quality

You can review the auditors’ history, so you know exactly who you are working with.

Check out our most recent audits

Proven Track Record

40+ successful audits completed

All successfully coordinated through Hyacinth's platform.

Track

0 incidents reported post-audit

Hyacinth-audited projects have experienced no security breaches.

Track

100% client satisfaction

Protocols consistently highlight the quality of reports and communication.

Track

50+ top-tier auditors

Smart and non-smart contract audit experts — covering formal verification, penetration testing, key storage audits, Solidity, Rust, Cairo, and more.

Track

How does Hyacinth work?

How does
Hyacinth work?

1
Protocol mints NFT, deposits, and posts a bounty, retainer or an audit auction bid.
2
Qualified auditors can apply for bounties or retainers, and submit bids for audit biddings.
3
For bounties and retainers, protocols review applications. For audit biddings, they choose one based on submitted bids.
4
Audit begins (on-chain/off-chain).
5
Auditors review code and submit an audit report. Protocols fix any found errors or vulnerabilities.
Audit is completed, bounty or audit bidding is paid out. The protocol leaves the auditor feedback on-chain.

The first
on-chain peer-to-peer
auditing platform.

The first on-chain
peer-to-peer auditing
platform.

Faster

Inspire consumer confidence by receiving your audit on-chain and having your code locked during your audit.

Faster

Code is locked during the audit; the contract being audited can’t be interacted with, protecting retail funds in case a vulnerability has yet to be discovered.

Faster

Code is locked after the audit; the contract can’t be upgraded, removing a significant attack vector and ensuring that the code in the audit report exactly matches the deployed code.

In Web3, trust starts with real audits

No shortcuts. Clear process.
Zero hacks post-audit.

Track

Working with Hyacinth made the audit process seamless.

The transparency and responsiveness throughout gave us full confidence in the results.”

Lina R., Co-founder at Drift Protocol

"We’ve done several audits in the past, but none felt as smooth and professional as this.

Clear reporting, fast communication, and zero issues post-launch."

Jason K., CTO at Nebula Finance

"Hyacinth connected us with top-tier auditors who truly understood our smart contracts.

We’ll definitely use it again for our next deployments."

Jason K., CTO at Nebula Finance
Track

Working with Hyacinth made the audit process seamless.”

The transparency and responsiveness throughout gave us full confidence in the results.”

Lina R., Co-founder at Drift Protocol
Track

We’ve done several audits in the past, but none felt as smooth and professional as this.”

Clear reporting, fast communication, and zero issues post-launch.”

Jason K., CTO at Nebula Finance
Track

Hyacinth connected us with top-tier auditors who truly understood our smart contracts.”

We’ll definitely use it again for our next deployments.”

Jason K., CTO at Nebula Finance

Want to submit your own code for an audit?

Mint a Proof of Protocol NFT to begin posting bounties.

Get Started