Offensive security in exchanges, custodians, smart contracts, DeFi, NFT and blockchain infrastructure.
Why now
Crypto is real money in unrevertable smart contracts. Contract bugs cost billions in recent hacks. A compromised exchange burns customers. CVM has regulated — there are now fines and civil liability for technical failures.
Applicable regulation
/attack-surface
Every engagement is designed for your environment. The points below are part of our standard playbook for this sector — final scope is adapted to your stack and contract.
Solidity, Rust, Move. Reentrancy, integer overflow, access control, frontrunning.
Hot wallet, cold wallet, MPC, HSM, withdrawal process.
Message validation, replay, validator failure.
AMM, oracle manipulation, flashloan, sandwich attack.
KYC/AML, bureau integration, transaction monitoring.
/methodology
Automated scanners find what's documented. Real attackers find what isn't. 90% of the work is manual — performed by specialists holding OSCP, CISSP, CRTO and GPEN.
Target mapping, OSINT, footprint, sector-specific threat modeling.
Deep enumeration, complementary scanning, manual exposure identification.
Manual validation with controlled PoC, finding chaining, escalation.
Executive + technical, step-by-step replication, mapped to applicable regulation.
/why-trust
Engagements in regulated crypto markets.
Technical assessment recognized in highly regulated, mission-critical environments — the pentest that finds what nobody had found before.
Douglas Lopes
Founder · CEO · intrus.io
/faq
Yes. Solidity, Rust, Move. Static, dynamic and manual code review.
Yes. The pentest can compose the technical dossier for VASP licensing.
/contact
Schedule a confidential meeting. Within 48h we'll send a proposal with scope, timeline and pricing.