Securing Ethereum
Smart Contracts since 2017

Smart Contract Audits for Ethereum protocols and institutions. Supercharged by AI agents, guided by veteran experts.

Collaborations to help Ethereum win

Ethereum Foundation

References

Trusted by teams building the most critical infrastructure across Ethereum.

Request an audit and partner with a veteran boutique team that puts your security and success at the center.

Audit Services

Top quality audits, performed by experts, supercharged by agents.

Chonky mascot

Powered by Super Chonky

Developed by tintinweb

Expert guided agentic auditing is the new standard.

Expert auditors are still the key to highest quality security. Receive a best-in-class report by humans orchestrating agents through a custom workflow and verifying findings.

Agentic Scan before Audit

Use Chonky right from beginning of your development lifecycle. Reduce security debt, secure early.

Supercharged Expert Audit

Agentic efficiency and expert knowledge combined. While Chonky finds known vulnerabilities our veteran auditors discover and verify deep and complex attack vectors.

Continuous Agentic Scans

Make Chonky part of your team. Your personal audit assistant customised and integrated to your workflows.

Our specialisation

Smart Contract Testing + Audits

Highest quality code reviews to prevent costly hacks and signal a strong security stance.

Incident Response Planning

Attacks will happen, be ready to react and stop the hack. We show you how.

Pre-audit security assessment

Building securely right from the beginning avoids security debt and saves you costly rewrites and exploits.

SNAP Security Review

As Consensys Alumni we know the MetaMask Threat Model inside out. We find what others miss.

Pioneering fuzzing for complex systems

Fuzzing complements audits: fuzzers monitor your codebase to automatically, and therefore cost effectively, catch bugs early in the development lifecycle. We build specialized fuzzer to catch critical bugs in complex systems that would be hard to find otherwise.

zkVM / zk Systems

Critical Vulnerabilities detected:

circom

NOIR
Jolt fuzzing interface
Jolt analysis results

Smart Contracts

Continuous fuzzing for:

Compilers

Critical Vulnerabilities detected:

solx

Solidity

Testimonials

"We appreciate the Consensys Diligence team for taking on a very broad audit scope for Lido V3 and for maintaining a steady cadence of updates throughout the process. Their work went beyond surface-level issues and consistently challenged core design assumptions from the early stages, which helped us materially improve the codebase. Overall, the engagement contributed to a more robust and well-reasoned implementation."

— Eugene Mamin, CTO at Lido

"Working with the Diligence team has significantly strengthened the security of gnark since 2024. Their specialized fuzzers, Rio and Circuzz, have been continuously stress-testing our codebase for almost two years—uncovering at least three soundness and three completeness bugs that traditional methods missed. This kind of sustained, rigorous testing is indispensable for the mathematical integrity of the Linea ecosystem."

— Ivo Kubjas, Gautam Botrel, Gnark Team at Linea

"The Diligence team is truly world-class. From day one, they've been thoughtful, rigorous, and deeply collaborative. They don't just move through a checklist - they take the time to understand your architecture, your objectives, and the nuanced mechanics of your protocol. They approach the engagement like true partners, as invested in your project's success as you are. What stands out most is their professionalism and sense of ownership. Communication is proactive and clear, findings are actionable and well-reasoned, and the team consistently operates with a builder's mindset. If you're building serious onchain infrastructure and want an audit partner you can trust completely, this is the gold standard."

— Billy Luedtke, Founder at Intuition

Technology & Research

Tools to make security work easier

It is almost a tradition to develop and publish tools that make the lives of security researchers easier and help developer to create more secure code. Here is a selection of tools from 2017 until today.

Blog

The latest from our Blog