Thrive Without Fear

Established in 2016, ChainLight's award-winning experts provide tailored security solutions to fortify your smart contracts and help you thrive on the blockchain.

Award Winning Team

Powered by the world's leading white hat hackers.

2016

DEF CON 24

CODEGATE

HITCON

SECCON

Plaid CTF

2017

DEF CON 25

CODEGATE

HITCON

SECCON

SCTF

Plaid CTF

2018

DEF CON 26

CODEGATE

SCTF

2019

DEF CON 27

CODEGATE

Cyber Conflict Exercise

2020

DEF CON 28

CODEGATE

Hacker's Playground

Cyber Conflict Exercise

2021

DEF CON 29

HITCON

Hacker's Playground

Realworld CTF

Cyber Conflict Exercise

Whitehat Contest

2022

DEF CON 30

CODEGATE

Google CTF

Hacker's Playground

Realworld CTF

Plaid CTF

WACON

Paradigm CTF

Cyber Conflict Exercise

Whitehat Contest

2023

DEF CON 31

CODEGATE

HITCON

SECCON

Google CTF

Hacker's Playground

Line CTF

Realworld CTF

Plaid CTF

Paradigm CTF

Dragonfly CTF

Quill CTF

Numen CTF

Ingonyama ZK CTF

Curta CTF

Rareskills CTF

Cyber Conflict Exercise

Whitehat Contest

Proven Record

From not only Web2, but also Web3

View Awards List

Security First Solutions

For Web3 builders, ChainLight solutions improve safety of your product, clients, and users.

Security Audit

With a proven track record of zero client compromises and numerous competition victories, ChainLight's Security Audit identifies vulnerabilities and offers tailored recommendations to enhance the security of your blockchain solutions.

Solidity
Severity
Critical
Incorrect liquidity invariant check leads to the theft of funds

Digital Asset Risk Tracker (DART)

DART goes beyond a Web3 risk management platform. Consider it a vigilant sentinel, revealing concealed threats that often escape standard risk assessments and security audits.

Total Risks: 5
1
2
1
1
Anyone can mint unlimited tokens.
Critical
Supply
Security
This token can be mintable without limit.
High
Supply
Circulating supply mismatches the whitepaper.
High
Supply
Operation
This token contract has a centralized minting authority.
Medium
Centralization
Project is upgradeable.
Low

Relic Protocol

Relic Protocol is the world’s first trustless oracle for Ethereum’s historical data. Utilizing zk-SNARKs and optimized on-chain state verification, Relic Protocol enables dApps to access historical data securely, eliminating the reliance on third-party authorities and minimizing gas usage.

Solidity

Backed by

Thrive Without Fear

Established in 2016, ChainLight's award-winning experts provide tailored security solutions to fortify your smart contracts and help you thrive on the blockchain.

Contact Us