Composable Security specializes in (re)staking, AVS, and Uniswap V4 projects.
🤝 What We Offer
Smart Contract Audits
We manually audit smart contracts to catch bugs, vulnerabilities, and logical errors. Our method combines automated tools, in-depth manual review, threat modeling, and client collaboration.
Threat Modeling
We help projects spot potential risks early by designing threat models customized to their architecture.
Security Consultations
We advise projects on security improvements, development best practices, and how to harden deployments over time.
Read more about our approach here: https://composable-security.com/blog/how-we-do-smart-contract-audit/
🏆 Achievements and Contributions
📚 Case Studies and Impact
Check more reports here: https://composable-security.com/our-work/
This site contains content and information, including links to other sites and resources, that was prepared by third parties ("Third Party Content") who are not affiliated with Circle or any of its affiliates (collectively "Circle"). Circle makes no representations on the accuracy, suitability, or validity of Third Party Content. As such, Circle is neither responsible nor liable for any Third Party Content, including any errors, omissions, or delays, or for any actions taken in reliance upon any Thirds Party Content. Reference to any specific company, product, service, or website of any third party does not constitute an implied or express endorsement, recommendation, favoring or validation by Circle. All content provided is for educational and informational purposes only. Circle shall not be liable for any damage or loss relating to use of, or reliance upon, the Third Party Content.