Smart contract security layer

Verifiable Security Policies to protect you from all kinds of risky transactions
Real-time
Security audits are only one piece of the puzzle. Continuously verify every interaction in real-time
Universal
Harness the best of both, deep protocol expertise and latest security research, with policies for risks from every angle
Actionable
Contextual security detections integrated your workflow, no passive data
Modular
Guardrail monitors projects across the ecosystem to bring the intelligence to you
Audits
Bug Bounty
Monitoring

Secure the next generation of the web

For web3 to get into the hands of mainstream users, there cannot be exploits that steal millions of dollars in a single transaction.
TVL
~ 120B+
lost to hacks
~ $4B+
every
~ 1.8 days

Empower your team with the best security when you go

    LIVE
Guardrail gives you a real-time view of threats across every contract and interaction, using a combination of anomaly detection, invariants, machine learning, leaving no intel behind to customize detection & response and give you constant peace of mind.

Critical Anomaly Detection

Enable high signal / low noise anomaly detectors tailored to your interactions to pick up the first sign of an attack

Real-time invariant testing

Cover every edge case, leaving no gaps for attackers, with the help of our researchers to onboard per-contract invariants

Proactive Prevention

Don’t rely on user reports and complex multi-sigs, limit time spent on security with automated prevention, investigation and guides.

Real-time system health

View your most critical alerts, relevant security news, and real-time view of your security in one place.

You want guardrails,

not gatekeepers

Static rules can’t keep up with dynamic attack behaviours, and individual signals alone aren’t enough. Guardrail solves for always-incoming attackers and the black-swan exploits.

  • Continuously updated security research powering analysis
  • Performant Security & AI analysis techniques built-in
  • Get answers quicker when working closely with our experts

How does it work

We combine your protocol expertise with our security research to tailor the best security policies for your project

Guards

Get the very best of offchain & onchain security techniques as verifiable policies: invariants, economic risks, anomalies

Monitor

With Guardrail as your security policy middlelayer, keep contracts simple and run security policies in real-time or in simulation

Prevent

Enforce your policies with prevention integration, proactively defending risky transactions rather than reacting after the fact

See the benefits

Buy
Designed for the most demanding latency-sensitive workloads
Ready today: no building, no maintaining
Constant security research & testing
Cross-chain, high-performance, customizable
Anomaly Detection & AI pre-built
Data Driven

Always ON

Build
Into the weeds of cross-chain data, security research and live tuning.
Build for 6 months
Build for 6 months
Hacked together scripts
Do your own research
Audit Driven

Incomplete & Unreliable

Bring Guardrail

into your workflow today
‘We were surprised with how easy it was to set up security detections we thought would take us months, but ready in a day.’
‘Having Guardrail from day 1 launch, we are ahead of the suspicious activity on our protocol & token, addressing gaps before they turn into hacks.’
‘After our audit and in-house security researcher, Guardrail increased our ROI on existing spend and supercharged the productivity across the team on security.’

Securing Web3 is a team effort

not gatekeepers
Guardrail remains in the background day-to-day, pushes intel for your attention only when needed, and proactively protects where configured.