Unparalleled Security at

Perimeter's expertise in directed fuzzing uncovers what audits miss, keeping DeFi's largest protocols and smart contracts secure for today's launch and fortified for tomorrow's upgrades

Trusted by the Best

fuzzy-img
fuzzy-img
fuzzy-img
fuzzy-img

Our Services

Offensive Fuzzing

Offensive Fuzzing

  • Flexible Timelines
  • Uncover Deep Rooted Bugs
  • Effortless Onboarding
  • Frequent Communication
  • Remediations Included
  • Comprehensive Report
Defensive Fuzzing

Defensive Fuzzing

  • Everything in offensive fuzzing plus:
  • Highest Level of Depth
  • Complete Documentation
  • Cost Efficient
  • Ready for Long Term Use
  • Seamless Integration
Bespoke Fuzzing

Bespoke

  • Supporting but not limited to:
  • Non-EVM Fuzzing
  • Blockchain/DLT Fuzzing
  • Building Dedicated Tooling
  • Security Advisory

Our Methodology

Security Assessment Process

We collaborate closely with your team at every stage, ensuring business and code objectives are achieved securely and efficiently.

  • No parallel reviews, full focus guaranteed
  • Minimum one lead fuzzing specialist per engagement
  • Clear communication at every stage
  • Fully transparent from start to finish
  • Fastest timelines, minimal coordination overhead
  • POCs for all High/Crit and non-trivial findings
01
Engagement Kickoff
The engagement starts with aligning on objectives, reviewing the protocol's technical architecture, and identifying key invariants to prioritize.
02
Build Phase
During this phase, the fuzzing harness is developed, simple invariants are implemented, and more complex ones are identified and integrated.
03
Execution Phase
Deep fuzzing runs are performed on enterprise hardware, with a focus on tracing broken invariants and analyzing edge-case behavior.
04
Remediations
The harness is updated to reflect any fixes made in response to issues uncovered during the execution phase.
05
Report Delivery
A detailed report is provided, summarizing all findings, methodology, and recommendations from the engagement.
06
Codebase Integration
A pull request is submitted to your codebase containing the finalized fuzzing harness for long-term integration.

Our Past Experience

$0+

TVL Held in Fuzzed Contracts

+0Invariants Identified
and Implemented
+0Fuzzing Engagements
Successfully Completed

Why the Best Trust Us

Meet Our Elite Team

0xScourgedev

0xScourgedev

CEO & Lead Fuzzing Specialist

He brings extensive experience in performing fuzzing engagements for some of the largest DeFi protocols, including Pendle, Berachain, Immutable, Synthetix and various other protocols

Perimeter github logoX-logo
Rappie

Rappie

CTO & Lead Fuzzing Specialist

One of the OGs in EVM fuzzing, helped secure massive companies such as Coinbase, and continues to push the boundaries of smart contract security through research and fuzzing innovation

Perimeter github logoX-logo
Antonio Viggiano

Antonio Viggiano

Advisor & Lead Fuzzing Specialist

Spoke and published many research papers on EVM fuzzing. The editor of All Things Fuzzy, a newsletter focused on invariants, fuzzing, symbolic testing, and formal verification

Perimeter github logoX-logo
Josselin Feist

Josselin Feist

Lead Fuzzing Specialist

Author of Slither. Ex-engineering Director of the Blockchain team at Trail of Bits, 8+ years focused on blockchain security. Led countless security reviews in Solidity, Go and Rust

Perimeter github logoX-logo
Contact Us

Have any questions? Want a boutique service? Contact us!

You will hear back from us within 48 hours
Contact Us
perimeter-logo

Perimeter is built on uncompromising quality, consistent communication, and transparency.

X-logoGithub-logo

Open Source

Fuzzlib

Arachne

EVM Fuzzing Resources

Public Fuzzing Campaigns

Resources

Portfolio

Public Reports

Benefits of Fuzzing

Technical Concepts for Fuzzing

Legal & Contact

Terms and Conditions

Privacy Policy

info@perimetersec.io

Paxtonstraat 3 N Box A2345 8013RP Zwolle, The Netherlands

Copyright 2025 | All Rights Reserved