The client is an international Web3 development company that created its own smart contract with AI and the ERC-20 standard and was preparing for its launch.
Since the platform works with confidential payment data and interacts with exchanges, the lack of proper cybersecurity could have led to asset losses, blocked access to the product, and even a complete business shutdown.
For this project, Datami applied a White-box approach with full access to the source code and comprehensive security testing. The smart contract audit combined static code analysis and dynamic testing of contract behavior.
The team used automated tools (Slither, solcgraph, Mythril) and manual review by multiple auditors. For deeper analysis, custom fuzz tests were created with Echidna, which revealed logical errors and atypical scenarios.
The uniqueness of the process lay in the step-by-step application of classical tools together with Datami’s own solutions. First, a manual code audit was carried out, then automated scanners were applied. Next, fuzzing was launched and custom tests were created to check atypical scenarios.
Finally, all results were analyzed and documented - the client received a detailed report.
Every
The audit of two smart contracts was completed on schedule. Thanks to this project, the risk level was reduced from high to minimal – the client’s product was prepared for certification and entry into exchanges.
During testing, the Datami team discovered 2 critical vulnerabilities, 5 medium, 8 low, and 25 informational. Among the main threats were:
The client was provided with two interim reports and, upon completion, a final document with the audit results and recommendations for strengthening security.
In the world of blockchain, code cannot be fixed after launch, so any vulnerability can become fatal: leading to significant financial or reputational losses, or even a complete product shutdown. That’s why verifying the security of Web3 solutions before release is critically important.
And this case confirms it: thanks to a comprehensive audit of smart contracts, the client eliminated 40 threats in advance – confirmed the security of the code, and prepared the product for certification and a safe entry into exchanges.
Microsoft announced a new update to Defender for Office 365 that automatically detects and blocks email bombing attacks. The rollout started in June, and most users will receive the feature by mid-July 2025.
Cloudflare reported that it stopped the most powerful UDP flood DDoS attack aimed at exhausting system resources. In 35 seconds, the attackers flooded the company with traffic at 11.5 Tbit/s.
Among internet users, a long-standing myth has taken hold: if a website has the HTTPS mark - that is, a padlock in the address bar and the letter S after “http” - it means the resource is safe and trustworthy. But in reality, the situation is much more co