Frequently Asked Questions

Everything you need to know about Vericode's AI-powered smart contract security platform.

1About Vericode

What is Vericode?+

Vericode is an AI-powered smart contract security platform that delivers professional-grade audits in minutes instead of weeks. Our multi-stage pipeline combines industry-standard static analysis tools with multiple AI reasoning models and a curated knowledge base of 483,000+ real findings from leading audit firms including Trail of Bits, OpenZeppelin, PeckShield, Cyfrin, and SpearBit.

Is Vericode a replacement for traditional audits?+

For the vast majority of projects, Vericode provides coverage comparable to professional auditors at a fraction of the cost and time. However, for protocols managing hundreds of millions in TVL, we recommend using Vericode as a first line of defense alongside a traditional audit. Vericode catches the same classes of vulnerabilities in minutes, allowing you to fix issues before the expensive manual review even begins — saving time and money on both sides.

How does Vericode differ from other AI audit tools?+

Most AI audit tools are simple wrappers around a single language model — they send your code to ChatGPT or Claude and return the response. Vericode is fundamentally different:

  • Multi-stage pipeline — multiple specialized AI models analyze your code independently, then cross-verify each other's findings
  • Static analysis foundation — Slither, Mythril, and Aderyn run in parallel as the ground truth layer before AI analysis
  • Protocol-aware invariant checking — our system knows the specific invariants that should hold for lending protocols, AMMs, vaults, staking, and other DeFi patterns
  • Quality gate — an advanced verification layer traces each finding through the actual code path, dramatically reducing false positives
  • RAG knowledge base — 483K+ real findings from top firms provide context that no single model has

This architecture cannot be replicated by prompting a single AI model, regardless of how sophisticated the prompt is.

2Vericode vs Traditional Auditors

Traditional AuditVericode
Cost$50K – $200K+From $39
Time to report2 – 8 weeksUnder 10 minutes
Continuous monitoringNoYes
Re-audit after changesAdditional cost & weeksInstant re-scan
Static analysis toolsYesSlither + Mythril + Aderyn
AI-powered deep analysisNoMulti-model pipeline
Knowledge baseTeam expertise483K+ real findings
Can Vericode catch real exploits?+

Yes. In our benchmark against the Compound V3 (Comet) protocol — one of the most audited DeFi protocols, reviewed by OpenZeppelin, ChainSecurity, and formally verified by Certora — Vericode independently detected critical issues including:

  • Locked ETH vulnerability in payable fallback functions
  • Admin parameter manipulation with no upper bounds
  • L2 gas accounting inconsistencies
  • Oracle stale price vulnerabilities

These are the same classes of issues that led to real-world exploits costing billions of dollars across DeFi.

Has Vericode been tested on real protocols?+

Yes. We regularly benchmark Vericode against protocols that have undergone professional audits by top firms. Our Real-World Impact section on the homepage shows a case study with the Moonwell Protocol, where Vericode would have detected all three oracle vulnerability types that led to a $1.78M exploit — automatically, in under 10 minutes.

3How It Works

How do I submit a contract for audit?+

There are three ways to submit a contract:

  1. Paste an Etherscan/Blockscout URL — we automatically fetch the verified source code from any supported block explorer
  2. Paste a GitHub link — we pull the Solidity files directly from your repository
  3. Upload .sol files — drag and drop or select files from your computer

Enterprise users can also submit multiple contracts for cross-contract protocol analysis, including automatic proxy detection (ERC-1967).

How long does an audit take?+

A typical single-contract audit completes in 3–10 minutes, depending on contract complexity. Multi-contract protocol audits (Enterprise) may take slightly longer. You can track real-time progress in your dashboard, including queue position and current analysis stage.

What's included in the audit report?+

Every audit report includes:

  • Vulnerability findings with severity ratings (Critical, High, Medium, Low, Informational)
  • Detailed descriptions of each issue with affected code locations
  • Fix recommendations with suggested code changes
  • References to similar vulnerabilities from real-world audits
  • Executive summary with overall risk assessment

Reports are available in both PDF and Markdown formats for easy sharing with your team and stakeholders.

What types of vulnerabilities can Vericode detect?+

Vericode detects a wide range of vulnerability types across multiple categories:

Common Vulnerabilities

  • • Reentrancy (incl. cross-function)
  • • Access control issues
  • • Integer overflow / underflow
  • • Uninitialized storage
  • • Front-running / MEV risks

DeFi-Specific

  • • Oracle manipulation
  • • Flash loan attack vectors
  • • Price slippage exploits
  • • Liquidity pool invariant violations
  • • Governance manipulation

Advanced Issues

  • • Proxy upgrade vulnerabilities
  • • Cross-contract interaction bugs
  • • L2-specific gas accounting
  • • Admin privilege escalation
  • • Sandwich attack vectors

Gas & Best Practices

  • • Gas optimization opportunities
  • • Missing event emissions
  • • Unsafe external calls
  • • Unchecked return values
  • • Centralization risks
Which blockchains are supported?+

Vericode supports all EVM-compatible chains. You can submit contracts deployed on Ethereum, Polygon, Arbitrum, Optimism, Base, BNB Chain, Avalanche, and any other chain with Etherscan-compatible or Blockscout block explorers. Since we analyze Solidity source code, any EVM chain is supported.

4Continuous Monitoring

How does continuous monitoring work?+

Vericode offers two types of monitoring for Pro and Enterprise users:

💻 GitHub Monitoring

Connect your GitHub repository. Vericode watches for changes to .sol files and automatically triggers a new audit when code is pushed or a PR is opened. Results appear in your dashboard with a clear diff of new vs. resolved findings.

⛓️ Address Monitoring

Monitor deployed contract addresses across multiple chains. Vericode periodically re-scans the contract and alerts you if new vulnerabilities are detected based on updated analysis capabilities or changing security landscape.

Will I get alerts for new vulnerabilities?+

Yes. When a monitored contract triggers new findings, you'll see them flagged in your dashboard. Email notifications can be configured for critical and high-severity issues. Each finding is tracked individually, so you can see which issues are new, which persist, and which have been resolved.

5Pricing & Billing

Starter

$39one-time
  • 1 full security audit
  • PDF & Markdown report
  • AI vulnerability detection
  • Perfect for testing

Pro

$99/month
  • 4 audits per month
  • PDF & Markdown reports
  • Continuous monitoring
  • Supplementary docs analysis
  • Email support

Enterprise

$499/month
  • Unlimited audits
  • Multi-contract protocol audit
  • Proxy detection (ERC-1967)
  • Cross-contract analysis
  • API access & CI/CD
  • Priority SLA & support
Why is there no free tier?+

Each audit runs a heavy compute pipeline: three static analysis tools in parallel, multiple frontier AI reasoning models running independently, cross-model verification, protocol-aware invariant checking, and a quality gate that traces each finding through the code. This infrastructure has a real per-scan cost that we can't absorb at scale.

Our Starter plan at $39 for a single audit keeps the price accessible — orders of magnitude cheaper than traditional auditors — while covering the compute cost of a thorough, professional-grade analysis. You get the same multi-model pipeline and quality gate as Enterprise users.

What payment methods do you accept?+

We accept two payment methods:

  • Credit/debit cards — processed securely via Stripe
  • Cryptocurrency — USDC, USDT, and native tokens (ETH, BNB, POL, AVAX) on 7 networks: Ethereum, Base, Arbitrum, Optimism, Polygon, BNB Chain, and Avalanche
How do I pay with crypto if I signed up with email?+

When you sign up with email, Google, or Apple, Privy automatically creates an embedded wallet for you. This wallet is used for crypto payments, but it starts with a zero balance.

To fund your embedded wallet and pay with crypto:

  1. Find your wallet address — go to your Dashboard and look for your wallet address in the payment/profile section
  2. Send funds from an external wallet or exchange — transfer USDC, USDT, or native tokens (ETH, BNB, POL, AVAX) to your embedded wallet address on any of our 7 supported networks
  3. Choose crypto at checkout — once funded, select the crypto payment option when purchasing a plan

Tip: Base and Polygon have the lowest gas fees (under $0.01). If you prefer not to deal with crypto, you can always pay with a credit or debit card instead.

Can I upgrade or downgrade my plan?+

Yes. You can upgrade your plan at any time from your dashboard. When upgrading, you'll get immediate access to the new plan's features. To downgrade or cancel, contact us at [email protected].

What's your refund policy?+

We offer a 14-day money-back guarantee for card payments. If you're not satisfied, contact us within 14 days for a full refund. Cryptocurrency payments are non-reversible due to the nature of blockchain transactions, but we'll work with you to resolve any issues.

What happens when I reach my audit limit?+

If you reach your monthly audit limit (4 for Pro), you can either wait for the next billing cycle or upgrade to Enterprise for unlimited audits. Monitoring scans don't count toward your audit limit.

6Security & Privacy

Is my source code kept private?+

Absolutely. Your source code is processed in an isolated environment and automatically purged within 24 hours of report generation. We never share, sell, or provide your code to third parties. Only the generated reports remain accessible in your dashboard. See our Privacy Policy for full details.

What data do you collect?+

We collect only what's necessary: email address, wallet address (for Web3 login), and the smart contract code you submit. We never collect private keys, seed phrases, wallet balances, or transaction histories. Analytics data is anonymized and used only to improve the platform.

Do you use my code to train AI models?+

No. Your submitted code is used solely for the purpose of generating your security report. It is not used for model training, fine-tuning, or any other purpose. Our AI knowledge base is built exclusively from publicly available audit reports and security research.

7API & Integration

Can I integrate Vericode into my CI/CD pipeline?+

Yes. Enterprise users get full REST API access, allowing you to trigger audits automatically on every commit, pull request, or deployment. This means security checks run alongside your tests — no manual steps required.

Do you support supplementary documentation?+

Yes. Pro and Enterprise users can upload supplementary documentation (technical specs, architecture diagrams, protocol descriptions) alongside their contracts. Our AI analyzes these documents for additional context, leading to more accurate and relevant findings.

Still have questions?

Reach out to our team or get started with your first audit.