SMART CONTRACT AUDITS / DEFI PROTOCOL REVIEW / WALLET FORENSICS / WEB3 INCIDENT RESPONSE

Blockchain Security For Smart Contracts, DeFi, and Web3 Operators

Petronella Technology Group audits the on-chain code, hunts the off-chain attack surface, and traces the wallets when something goes wrong. Founder Craig Petronella holds MIT-Certified credentials in AI and Blockchain, is Hyperledger Certified, and is a North Carolina Licensed Digital Forensic Examiner (DFE #604180). Smart contract audits, DeFi protocol reviews, NFT and wallet investigations, and Web3 incident response, run out of our Raleigh, NC headquarters since 2002.

EVM + Solana + MoveAudit coverage
24/7Incident response
DFE #604180Court-recognized examiner
MIT-Certified AI and Blockchain | Hyperledger Certified | CMMC RPO #1449 | BBB A+ Since 2003
Forensics desk active: chain analytics and wallet tracing on shift now
23+
Years Operating in Raleigh
MIT
Certified AI and Blockchain
DFE
NC License #604180
RPO
CMMC-AB #1449

You are reading this for one of three reasons. You are about to deploy a smart contract and want a second set of eyes before mainnet launch. You operate a DeFi protocol or NFT project and need a senior security partner on retainer. Or something has already gone wrong, funds are moving, and you need crypto forensics and a chain-analytics report your attorney can use. This page covers all three engagements. If you are in active loss, skip the reading and call (919) 348-4912 now.

Blockchain security is what happens when traditional cybersecurity discipline meets a settlement layer that does not roll back. Every transaction is final by design. A bug in a smart contract is not a defect to be patched in next week's release; it is a window through which value can leave the contract permanently in the time it takes the next block to confirm. The economic stakes change the risk model, the audit process, and the response playbook. Everything tightens.

Petronella Technology Group treats blockchain security as an extension of our broader cybersecurity practice, not a separate cottage industry. The same engineers who run penetration tests against Fortune 500 networks audit Solidity contracts. The same investigators who handle ransomware-extortion forensics trace stolen ETH across mixers and bridges. The same compliance team that builds CMMC programs maps DeFi protocols to SEC, FinCEN, and state money-transmitter requirements. The skill stack composes; the principles are universal even when the rails are new.

Founder Craig Petronella holds MIT-Certified credentials in AI and Blockchain from MIT, completed Hyperledger Certified training, and is a court-recognized cybersecurity and SIM-swap expert witness. He has authored fourteen Amazon best-selling books on cybersecurity and digital asset protection. The firm has operated continuously from 5540 Centerview Dr., Suite 200, Raleigh, NC 27606 since 2002 and holds an A+ BBB rating since 2003. We are not a Web3 startup that learned cybersecurity last quarter. We are a cybersecurity firm that learned Web3 the right way.

What This Engagement Covers

Blockchain Security, Plainly Defined

A working definition that survives contact with the chain. Blockchain security is the technical, operational, and forensic discipline of protecting on-chain code, off-chain infrastructure, and digital assets across the full lifecycle.

Blockchain security spans five layers, and a real program addresses every layer. Skipping any one of them leaves a structural gap that adversaries find. The five layers are smart contract code, protocol economics, off-chain infrastructure (RPC endpoints, validator nodes, oracle inputs), key management (custody, multisig, hardware wallets), and operational hygiene (deploy keys, upgrade governance, admin functions). The most expensive losses in the industry's history have come from gaps at the boundary between two layers, not from any single layer being completely unprotected.

Smart contract security is the audit discipline applied to on-chain code. Solidity for Ethereum and EVM-compatible chains. Rust for Solana. Move for Aptos and Sui. The audit reads the code line by line, runs static analyzers against known vulnerability patterns, fuzzes against unexpected inputs, models the protocol economically against adversarial actors, and produces a severity-ranked finding list with remediation guidance. Code stays in scope from initial review through post-fix retest.

DeFi protocol security extends the smart contract audit to the cross-contract surface. Composability is the feature that makes DeFi powerful and the property that makes it dangerous. A protocol may pass a clean per-contract audit and still get drained because of how it interacts with a flash-loan provider, a price oracle, or a downstream lending market. Auditing composability means modeling the protocol as one node in a larger graph, not as an island.

Wallet, custody, and key management security is the off-chain half of the equation that most teams under-invest in. A perfectly audited contract is irrelevant if the deployer's private key sits in a developer's .env file pushed to a public repo. We assess hardware wallet selection, multisig threshold design (typically Gnosis Safe or equivalents), hardware-security-module integration, signing-ceremony procedures, and key-rotation runbooks. The Bybit incident in February 2026 was a multibillion-dollar reminder that signing-flow security is not optional.

Web3 incident response and chain forensics is what we do when prevention fails. The discipline is closer to digital forensics than to traditional incident response: tracing addresses through mixers, identifying counterparties at regulated exchanges, building the subpoena targets, and producing a report your attorney can attach to a motion. Petronella's crypto forensics team works active cases for individuals, businesses, and law firms.

Why Web3 Audits Are Different

On-Chain Risk Is Not Web2 Risk

Application security carried over wholesale from the Web2 world misses the failure modes that matter most in Web3. The economic surface is the surface.

Web2 Security Model Applied to a DeFi Protocol

  • Treats the contract as a black-box service, ignores composability with other protocols on the same chain.
  • Models the attacker as a single actor with finite capital; ignores flash loans that lend unlimited capital for one block.
  • Assumes incidents can be patched in a hotfix window. On-chain bugs ship in the block they execute in.
  • Focuses on input validation; misses MEV, oracle staleness, governance attacks, and signature replay.
  • Treats admin keys as a deployment detail. In Web3 the admin key is the entire trust model.

Blockchain-Native Security Model

  • Reviews the protocol as one node in the broader DeFi graph, including downstream and upstream dependencies.
  • Models the attacker with access to flash-loan capital, single-block atomicity, and MEV searcher infrastructure.
  • Treats every state-changing function as deploy-it-or-do-not. The pause and upgrade mechanisms are audited, not assumed.
  • Audits oracle source list, time-weighted-average-price windows, fallback logic, and staleness handling explicitly.
  • Treats key custody as a first-class threat surface. Multisig, HSM integration, and signing rituals get the same scrutiny as the code.

The honest comparison: Web2 security practice is necessary but not sufficient. The OWASP-aligned mindset still applies to wallet front-ends, RPC endpoints, custodial back-ends, and exchange integrations. What it does not cover is the on-chain economic surface, the composability graph, and the irreversibility constraint. A blockchain security engagement layers the chain-native skill set on top of standard application security, not in place of it. Both halves matter.

Service Lines

The Engagements We Run

Four service lines that cover the lifecycle from pre-deployment audit through post-incident recovery. Most customers start with one and expand into the others as the relationship matures.

Service Line 1 / Pre-Deployment

Smart Contract Security Audit

The fixed-scope engagement most teams come for first. Solidity, Rust, or Move codebase reviewed against known vulnerability patterns, business logic, composability surface, and upgrade mechanisms. Detailed findings report, severity ratings, remediation guidance, and post-fix verification retest.

  • Static analysis with Slither, Mythril, Semgrep, Aderyn
  • Fuzzing with Echidna, Foundry, Halmos for invariant discovery
  • Manual line-by-line review by senior auditor
  • Gas optimization and denial-of-service surface analysis
  • Severity-ranked report with reproducible proof-of-concept exploits
Service Line 2 / Operating Protocols

DeFi Protocol Security Retainer

Ongoing partnership for protocols already deployed and accumulating value. Quarterly re-audits as new contracts ship, monthly threat-intelligence briefings on attacks affecting comparable protocols, real-time alerting on suspicious on-chain activity against your protocol, and an incident-response slot on call.

  • Quarterly delta audit of new and upgraded contracts
  • Monthly threat briefing on attacks against comparable protocols
  • Forta-style behavioral monitoring on configured contract addresses
  • Governance proposal review with security recommendation
  • Named senior point of contact and tabletop exercises
Service Line 3 / Active Loss

Web3 Incident Response and Forensics

The engagement no team wants but every team needs the phone number for. Wallet has been drained, contract has been exploited, NFT collection has been compromised, or signer has been phished. We move fast: chain analytics, address attribution, exchange notification, evidence preservation, and the formal report your attorney needs.

  • Chain analytics across BTC, ETH, EVM L2s, Solana, Tron, BSC
  • Mixer and bridge tracing with cross-chain hop reconstruction
  • Centralized-exchange freeze requests and law-enforcement liaison
  • Court-admissible forensic report and expert testimony
  • Coordination with FBI, IC3, Secret Service, and state cyber units
Service Line 4 / Custody and Operations

Wallet, Custody, and Key Management Assessment

For DAOs, treasuries, exchanges, custody platforms, and any team holding significant digital assets. We assess the full signing pipeline: wallet selection, multisig threshold design, hardware-security-module integration, signing-ceremony procedures, recovery seed handling, and disaster runbooks. Bybit-style signing-flow failures are exactly what this engagement prevents.

  • Multisig threshold and signer-distribution review
  • Hardware wallet selection and signing-ceremony assessment
  • Seed-phrase storage and recovery process review
  • Cold-to-warm-to-hot custody segregation
  • Disaster recovery and signer-incapacitation runbooks
Cross-Cutting / Penetration Testing

Blockchain Application Penetration Test

For projects where the on-chain code is only half the surface. We test the dApp frontend, RPC nodes, wallet-connect integration, custodial backend, API surface, admin dashboards, and infrastructure. Composes naturally with a smart contract audit on the same engagement, or stands alone for established projects with mature on-chain code. See the penetration testing service overview.

  • Frontend dApp pentest including XSS and supply-chain risks
  • RPC node and validator infrastructure assessment
  • WalletConnect, signing-flow, and transaction-simulation review
  • Custodial backend and admin-panel pentest
  • Bridge and cross-chain messaging layer review
Cross-Cutting / Compliance

Blockchain Compliance and Regulatory Posture

For protocols and businesses that need to operate inside the regulatory perimeter. SEC posture (Howey analysis support, transfer restrictions, accredited-investor checks), FinCEN money-services-business obligations, state money-transmitter mapping, and FATF Travel Rule readiness. Composes with the firm's broader compliance practice.

  • SEC posture review with counsel-coordinated technical controls
  • FinCEN BSA/AML program build for crypto MSBs
  • State-by-state money-transmitter mapping
  • FATF Travel Rule and VASP-to-VASP messaging readiness
  • NY DFS BitLicense and TruLicense advisory support

Not sure which service line you need? The scoping call is free and the recommendation is honest. We will tell you whether a single audit closes your gap, whether a retainer is the right structural answer, or whether your situation is actually an active incident that needs the forensics team. We do not earn referral fees on chain-analytics tools, custody platforms, or external assessor services, so the recommendation tracks what helps you rather than what pays us. Call (919) 348-4912 or use the contact form.

Threat Coverage

What Smart Contract Audits Actually Catch

Eight attack categories that recur across the engagements we run. Not a marketing list. Each one has produced a nine-figure loss somewhere in the public record.

Reentrancy SWC-107

The original Web3 vulnerability and still active a decade after The DAO. An external call inside a state-modifying function lets the callee re-enter the original function before the state is updated. Modern guards (ReentrancyGuard, checks-effects-interactions ordering, mutex flags) close the obvious form, but cross-function and cross-contract reentrancy variants still ship in production protocols.

The audit response: every external call gets traced, every state-write order gets validated against the checks-effects-interactions pattern, and read-only reentrancy paths get specifically modeled for view-function manipulation downstream.

Flash-Loan Manipulation DeFi-Specific

The composability attack. An attacker borrows tens of millions of dollars in a single block with no collateral, manipulates a price oracle or liquidity pool inside the same transaction, profits from the resulting imbalance, and repays the loan before block finalization. The attacker's capital risk is zero. The defender has to design for an adversary with unlimited single-block capital.

The audit response: every price source is reviewed for manipulation cost, oracles are required to be time-weighted or sourced from manipulation-resistant feeds, and economic models include a flash-loan-capitalized adversary as the default threat actor.

Oracle Manipulation SWC-108

Smart contracts cannot read real-world data on their own; they depend on oracles. If an attacker can move the oracle (by manipulating the underlying liquidity, by exploiting a stale price window, or by compromising the oracle's data source), they can trigger unwanted liquidations, drain lending positions, or mint unbacked synthetic assets. Chainlink-style decentralized oracle networks reduce the risk; single-source oracles remain a frequent failure mode.

The audit response: oracle architecture is reviewed for source diversity, update frequency, staleness handling, deviation thresholds, and circuit-breaker logic for outlier values.

Access Control Failures SWC-105

Missing onlyOwner modifiers, unprotected initialize functions on upgradeable proxies, role-based access patterns with privileged roles assigned to externally-owned accounts that have been compromised. The textbook example is the Parity Wallet incident where an unprotected library function let any caller take ownership and then self-destruct the library, freezing hundreds of thousands of ETH.

The audit response: every state-changing function is mapped to its access control surface, every modifier is verified, every role-assignment path is traced, and every proxy initialization is checked for re-initialization vectors.

Bridge and Cross-Chain Exploits Cross-Domain

Cross-chain bridges aggregate value from many chains into one custody surface, which makes them the highest-value targets in the ecosystem. Ronin, Wormhole, Nomad, Multichain, and Harmony Horizon between them lost billions of dollars to bridge-specific failures: validator-set compromise, signature verification bugs, message-replay vulnerabilities, and trusted-relayer assumptions that did not hold under attack.

The audit response: validator-set decentralization is assessed, signature aggregation logic is reviewed against replay and malleability vectors, message authentication is traced end-to-end, and exit-mechanism behavior is tested under partial-trust assumptions.

NFT and Token Standard Deviations ERC-721 / 1155

ERC-721, ERC-1155, and emerging royalty standards (ERC-2981, ERC-4907) have subtle implementation traps. Missing safe-transfer checks, improper royalty enforcement, mint quota bypasses, metadata-mutability without access control, and signature-based mints with replay-able signatures all show up in production NFT contracts. The collections that get exploited rarely had their contracts independently audited.

The audit response: the contract is tested against the full standard test suite, royalty enforcement paths are traced, signature-based flows are analyzed for replay and chain-id binding, and metadata mutation is verified to require appropriate authorization.

Signature and Phishing-Driven Drainer Attacks Operational

The category that turned 2024 and 2025 into a wallet-drainer plague. Users sign a Permit, SetApprovalForAll, or seaport-style order in a wallet UI that misrepresents what is actually being authorized. Drainer-as-a-service kits weaponize signed messages to sweep tokens long after the original signing event. Off-chain signatures are the soft surface where most retail losses now originate.

The audit response: every off-chain signature flow is reviewed for EIP-712 domain binding, expiry, and nonce semantics; UX is reviewed to ensure wallet prompts present human-readable consequence; and drainer-aware monitoring is configured for the protocol's signature scheme.

MEV and Front-Running Economic

Public mempools let validators and searchers reorder, insert, or sandwich transactions for profit. Protocols that price-discover on-chain (DEXes, liquidations, NFT mints) can be sandwiched in ways that extract value from end users without violating any code-level invariant. Solana auction designs and Ethereum proposer-builder separation reshape the MEV surface but do not eliminate it.

The audit response: every state-changing user action is reviewed for MEV exposure, mitigations are recommended where appropriate (commit-reveal, batch auctions, private mempools like Flashbots Protect or MEV Blocker), and the trade-offs are documented for product team decision.

Audit Methodology

How a Smart Contract Audit Actually Runs

A six-phase methodology that every Petronella smart contract engagement follows. The phases run in sequence; nothing skips. Total elapsed time depends on codebase size and complexity, not on artificial deadline pressure.

01 SCOPE
Scoping and Architecture
Repo review, threat model, scope written, fixed quote in writing
02 AUTO
Automated Analysis
Slither, Mythril, Semgrep, Aderyn, Echidna, Foundry invariants
03 MANUAL
Line-by-Line Review
Senior auditor reads every function, traces every call
04 ECON
Economic Modeling
Adversarial scenarios with flash-loan capital, MEV access
05 REPORT
Findings and Remediation
Severity-rated findings, proof-of-concept exploits, fix guidance
06 RETEST
Verification Pass
Post-fix retest confirms remediations, signs off public report
+-------------------+      +-------------------+      +-------------------+      +-------------------+      +-------------------+
|  SCOPING          |      |  ANALYSIS LAYER   |      |  REVIEW LAYER     |      |  REPORT LAYER     |      |  RETEST          |
|  - repo intake    |      |  - static (4 tools|      |  - line-by-line   |      |  - severity rated |      |  - confirm fixes |
|  - threat model   | ---> |  - fuzz (Echidna) | ---> |  - business logic | ---> |  - PoC exploits   | ---> |  - public report |
|  - fixed quote    |      |  - symbolic exec  |      |  - composability  |      |  - remediation    |      |  - listing badge |
|  - written SOW    |      |  - invariants     |      |  - econ modeling  |      |  - architectural  |      |                  |
+-------------------+      +-------------------+      +-------------------+      +-------------------+      +-------------------+
        |                                                                                                            |
        +------------------------------ FEEDBACK: in-engagement comms via shared channel + daily syncs --------------+
    

The single biggest predictor of audit quality is how much time the senior auditor spends in the code, not how many tools get run against it. Automation surfaces the known patterns. Humans find the novel ones. Every Petronella audit is led by a senior engineer who has the authority to flag a finding the tools missed, and the obligation to write up the reasoning in the report. We do not outsource the manual phase to junior reviewers or offshore desks. If you have ever received an audit report that read like a tool-output dump, you understand why this matters.

Engagement Timeline

The First Sixty Days for a Typical Protocol

Honest milestones for a midsized DeFi protocol engaging on a single audit plus a retainer follow-on. Smaller scopes complete sooner; larger ones take longer. The structure is the same.

Day 1 to 5

Kickoff and Scope Lock

  • Senior auditor named, introductory call, shared comms channel
  • Codebase intake: repo commit hash, deployment addresses, test suite
  • Threat model built collaboratively with protocol team
  • Fixed-fee quote in writing with start date and report date
  • Signed SOW, audit calendar booked, NDA executed
Week 1 to 2

Automated and Manual Review

  • Static analyzers run, output triaged against false positives
  • Echidna and Foundry invariants defined, fuzz campaigns launched
  • Senior auditor begins line-by-line read
  • Daily async updates in shared channel
  • Early-finding flags raised mid-engagement for high-severity issues
Week 3

Report and Remediation

  • Draft report delivered, walkthrough call with protocol team
  • Severity-rated findings with proof-of-concept exploits
  • Remediation guidance with code-level suggestions
  • Protocol team begins fixes against draft report
  • Open questions resolved in shared channel
Day 30 to 60

Retest and Retainer Transition

  • Post-fix retest of every reported finding
  • Public-facing report signed off and published to your repo
  • Optional retainer kickoff: monitoring rules deployed, threat briefings scheduled
  • Quarterly delta-audit cadence set for upgrades
  • Incident-response on-call slot activated

The numbers above hold for a midsized engagement, roughly 1,500 to 3,500 lines of in-scope Solidity with moderate composability. A simple ERC-20 with no special logic completes in a single week. A complex cross-chain protocol with bespoke validator logic and upgradeable proxies can run six weeks or longer. The scoping call produces an honest calendar; we do not promise a deadline we cannot keep, and we do not pretend a complex audit is simple because the timeline pressure is convenient for the deploy schedule.

Regulatory Surface

Blockchain Compliance That Holds Up

The regulatory landscape for blockchain is the busiest in financial services. Petronella maps your protocol or business to the rule sets that apply, builds the technical controls auditors and examiners expect, and partners with your counsel on the policy half.

Regulator / Regime Core Requirement Petronella Technical Controls
SECFederal securities law Tokens that meet the Howey test trigger registration requirements. Issuers face enforcement risk on unregistered offerings, secondary trading, and accredited-investor verification. Smart contract transfer restrictions, KYC and accreditation gates at the contract level, blocked-address registries, Reg D and Reg A surveillance hooks.
FinCENBSA, AML, MSB obligations Crypto exchanges, payment processors, and certain custody operators are money services businesses. BSA program, SAR filing, customer identification, and Travel Rule compliance apply. AML rules engine, blockchain analytics integration (Chainalysis, TRM, Elliptic), Travel Rule message routing (TRP, TRISA, Sygna), and SAR-eligible event capture.
FATF Travel RuleInternational VASP guidance Virtual Asset Service Providers must exchange originator and beneficiary information on qualifying transfers. Threshold and counterparty rules vary by jurisdiction. VASP-to-VASP messaging integration, threshold logic per jurisdiction, sanctions screening, counterparty due diligence, retention of message proofs.
NY DFS BitLicense and TruLicenseNew York virtual currency regime Operators serving New York residents in virtual currency activity require a BitLicense or limited-purpose trust charter. Cybersecurity Regulation 23 NYCRR 500 also applies. 500-aligned cybersecurity program, CISO function (often via our virtual CISO), encryption-at-rest and in-transit, MFA enforcement, annual penetration test.
State MTL PatchworkMoney transmitter licensing Most states classify crypto activity as money transmission. Surety bonds, license fees, and routine examinations apply, with significant variance by state. State-by-state requirement mapping, examination evidence pack, transaction-monitoring control library, and surety-aligned operational hygiene.
HIPAAFor health-data on-chain Protected health information stored or referenced on-chain falls within HIPAA scope. Encryption, access control, audit logging, and breach-notification obligations all apply. On-chain pointer architecture with off-chain encrypted storage, BAA-compliant operational model, see the HIPAA compliance practice.
CMMC Level 1, Level 2, Level 3For defense-contractor scopes Defense industrial base contractors handling CUI and FCI must implement CMMC controls. Blockchain-adjacent contractors are not exempt; the controls map identically. Full CMMC compliance practice, RPO #1449, SSP build, POA and M coordination, and C3PAO assessor liaison.
EU MiCAMarkets in Crypto-Assets Regulation EU-wide regime in force since 2024 covering asset-referenced tokens, e-money tokens, and crypto-asset service providers. Authorization, whitepaper, and ongoing reporting obligations. Whitepaper technical-disclosure review, custody-segregation architecture, market-abuse surveillance hooks, and ICT risk-management framework alignment.

Petronella does not provide legal advice; that is the role of your securities or fintech counsel. We provide the technical controls, the architectural decisions, and the audit-evidence trail that make the legal posture defensible. The two halves run in parallel: your attorneys decide what your protocol is in regulatory terms, and we build the on-chain and off-chain controls that match. The combined deliverable is what regulators, examiners, and counterparties actually want to see.

Practitioner

Who Leads the Practice

Blockchain security is a small field and credentials matter. The team that audits your protocol is the team you talk to in the scoping call.

Craig Petronella, Founder and CEO

PRACTICE LEAD / DIGITAL ASSETS AND ON-CHAIN INVESTIGATIONS

Craig founded Petronella Technology Group in Raleigh in 2002 and has spent more than thirty years in IT and cybersecurity, with the last two decades focused on cybersecurity, AI, compliance, and digital forensics. He is MIT-Certified in AI and Blockchain through Massachusetts Institute of Technology, a Hyperledger Certified professional, a graduate of MIT Sloan Executive Education in Cybersecurity for Managers, and a North Carolina Licensed Digital Forensic Examiner (DFE #604180). He holds CMMC Registered Practitioner, CCNA, and CWNE credentials.

Craig is a court-recognized cybersecurity and SIM-swap expert witness, with case experience spanning crypto romance scam recovery, SIM-swap-enabled wallet theft, and cryptocurrency scam recovery for individuals and businesses. He has authored fourteen Amazon #1 best-selling books on cybersecurity, ransomware, AI, and HIPAA compliance, and has been featured as a cybersecurity expert commentator on NBC, ABC, CBS, FOX, WRAL, and Time Warner Cable News.

The firm is a CMMC-AB Registered Provider Organization, RPO #1449, holds a BBB A+ rating since 2003, and operates from 5540 Centerview Dr., Suite 200, Raleigh, NC 27606. Every senior engineer is CMMC Registered Practitioner certified. For the full team roster, see our team page.

MIT-Certified AI and Blockchain Hyperledger Certified MIT Sloan Cybersecurity for Managers DFE #604180 (NC) CMMC-RP CCNA CWNE Expert Witness 14+ Amazon Best-Sellers
Who We Serve

Industries and Project Types in Scope

Blockchain adoption has moved well beyond the original crypto-native cohort. The customers Petronella works with span six recognizable categories. Each one has a distinct threat profile, regulatory map, and operational rhythm.

DeFi Protocols and DAOs DEFI-NATIVE

Decentralized exchanges, lending markets, perpetuals platforms, stablecoin issuers, yield aggregators, and the DAOs that govern them. Total value locked is the headline target; protocol upgrades and governance attacks are the rolling surface. Engagements typically pair a pre-deploy smart contract audit with a quarterly delta-audit retainer once the protocol is live.

The governance question deserves its own attention. Token-weighted voting with low quorum is an attack surface, not a feature. We review proposal-execution logic, timelock configurations, and the off-chain coordination assumptions that the on-chain governance depends on.

Centralized Exchanges and Custody Platforms REGULATED

CEXes, OTC desks, prime brokerages, and qualified custodians holding institutional assets. The signing-flow surface (hot, warm, cold) is where most losses originate; the Bybit incident is the most recent multibillion-dollar reminder. Engagements pair the wallet, custody, and key-management assessment with regulatory posture work (FinCEN MSB, FATF Travel Rule, state MTL, NY DFS BitLicense, EU MiCA where applicable).

Operational security around the signing ceremony is where we earn our keep. The audit covers the wallet selection, the hardware-security-module integration, the air-gap process, and the runbook for signer incapacitation.

NFT Projects and Game Studios NFT / GAMING

NFT collections, marketplaces, play-to-earn games, in-game item economies, and metaverse land registries. The on-chain surface is small (a single ERC-721 or 1155 contract); the off-chain surface is large (mint sites, signature-based allowlists, metadata pipelines, royalty enforcement, drainer-aware UX). Engagements typically combine a quick contract audit with a pentest of the mint and trading dApp.

Signature-based mints are where 2024 and 2025 produced the worst retail losses. We review EIP-712 domain binding, expiry, nonce semantics, and the human-readable consequence of every wallet prompt.

Enterprise Blockchain and Permissioned Ledgers ENTERPRISE

Hyperledger Fabric, Hyperledger Besu, R3 Corda, and other permissioned ledger deployments for supply chain provenance, trade finance, healthcare records, and inter-company settlement. Craig is Hyperledger Certified and the firm has shipped on the platform since the early Sawtooth releases. The threat model is different from public chains (insider risk is the dominant concern) but the audit discipline composes.

Permissioned-ledger engagements typically pair the smart-contract (chaincode) audit with a network-level security assessment of the validator nodes, the certificate authority, and the off-chain integration surface.

Individuals and Estates with Material Crypto Holdings RETAIL / HNW

High-net-worth individuals, family offices, and estates holding meaningful crypto positions. The work is roughly half forensics (when something has already gone wrong: romance scam, SIM-swap wallet theft, exchange counterparty failure) and roughly half wallet-architecture review (hardware wallet selection, inheritance planning, multisig design for personal custody).

Craig is a court-recognized SIM-swap and crypto expert witness; the firm regularly partners with civil counsel on stolen-asset recovery and surviving-spouse access litigation.

Law Firms and Litigation Support LEGAL

Civil litigators, criminal defense counsel, divorce and estate attorneys, and regulators needing on-chain forensic analysis to support a case. The deliverable is the report your attorney can attach to a motion, the chain-analytics work product your expert can testify against, and the subpoena targets your team can pursue. Petronella's digital forensics practice extends into the chain through this engagement type.

Evidence preservation is the first call. Cooperating exchanges, mixer tracing, and counterparty attribution all have a freshness window that closes fast.

Adjacent Services

Where Blockchain Security Fits in the Broader Program

Blockchain security composes with the firm's traditional cybersecurity, forensics, and compliance practices. Most engagements pull in two or three of the links below.

Field guides and deep dives. If you want to read further before the call, our long-form articles cover the operational ground: the cryptocurrency forensic investigator guide, the cryptocurrency security primer, the wallet security and types explainer, the MetaMask penetration testing walkthrough, and the pig butchering scam recovery guide. The blog is where the recurring questions get answered in depth.

FAQ

Blockchain Security Questions We Hear Most

If your question is not here, the scoping call is free and is the right place to ask it. Call (919) 348-4912 or use the contact form.

How is a blockchain security audit different from a regular code audit?

A traditional code audit looks for software-engineering defects: bugs, performance issues, maintainability concerns. A smart contract audit looks for adversarial exploitability: how an attacker with access to flash-loan capital, MEV infrastructure, and a public mempool can extract value from the contract. The mental model is different, the tooling is different (Slither, Echidna, Foundry invariants instead of unit tests and code coverage), and the deliverable is different. The findings report ranks each issue by severity, includes proof-of-concept exploits where feasible, and provides remediation guidance the development team can implement against. The retest pass confirms the fixes actually closed the vulnerability rather than moving it.

What blockchain platforms do you audit?

The firm audits across the major platform families. EVM chains: Ethereum mainnet, Arbitrum, Optimism, Base, Polygon, Avalanche C-Chain, BNB Chain, and EVM-compatible L2s and rollups. Solana: Rust contracts using Anchor or native programs. Move-family chains: Aptos and Sui. Hyperledger Fabric for enterprise permissioned deployments. Bitcoin script and Lightning for native Bitcoin Layer 2 work. If your project uses a less common platform (Cosmos SDK, NEAR, Tezos, Cardano), reach out and we will discuss feasibility and scope.

What does a smart contract audit cost?

Audit pricing is a function of codebase size, complexity, novelty, and timeline. A clean ERC-20 token contract with standard logic is a different engagement from a cross-chain bridge with bespoke validator logic. The scoping call produces a fixed-fee quote in writing before any work begins, with the start date, the report date, and the retest commitment all specified. We do not charge hourly for audit work and we do not surprise customers with overage bills. If the scope changes mid-engagement, the change is documented and quoted before any out-of-scope work happens.

What is your response time for an active blockchain incident?

If funds are actively moving and you suspect a compromise, call (919) 348-4912 immediately rather than using the contact form. The incident-response desk operates on a 24/7 basis for active losses. Initial triage happens within the first hour: chain analytics begin, exchange notification messages go out to centralized counterparties where stolen funds may be routed, and evidence preservation begins. The first few hours are the highest-leverage window for stolen-asset interception. Waiting until business hours costs recovery probability and can also weaken the eventual forensic record. See the crypto forensics page for the active-incident workflow detail.

Do you investigate scams against individuals or only enterprise clients?

Both. The firm regularly handles crypto romance scams, SIM-swap-driven wallet thefts, and pig butchering recovery cases for individual victims, often in coordination with law enforcement and civil counsel. Craig Petronella has provided expert-witness testimony in SIM-swap-related crypto theft litigation. Whether the loss is six figures from a personal wallet or eight figures from a protocol treasury, the chain-analytics workflow is the same; only the case management and reporting cadence differ. Reach out via contact form or call to discuss scope.

Can you help with wallet and custody design for a DAO treasury or exchange?

Yes. The wallet, custody, and key-management assessment is one of our four primary service lines. We review multisig threshold design (Gnosis Safe and equivalents on EVM, Squads on Solana, similar primitives on other chains), hardware-wallet selection and signing-ceremony procedures, hardware-security-module integration for institutional custody, seed-phrase storage and recovery runbooks, and the disaster-recovery process for signer incapacitation or compromise. The Bybit incident in early 2026 was a multibillion-dollar reminder that signing-flow security is not optional and is not the same problem as smart contract security. We treat the two as separate engagements that compose.

How does blockchain security fit with CMMC, HIPAA, or SOC 2 compliance?

Cleanly. The firm operates a full compliance practice covering CMMC Level 1, Level 2, and Level 3 (we are CMMC-RP certified and operate as a CMMC-AB Registered Provider Organization, RPO #1449), HIPAA, PCI-DSS, SOC 2, ISO 27001, and other frameworks. Blockchain-adjacent businesses do not get an exemption from these regimes. Defense contractors handling CUI need CMMC. Health-data-on-chain operators need HIPAA. Payment-rail integrations need PCI-DSS. We build the technical and operational controls that map to the controls each framework requires, and we coordinate with assessors and counsel on the policy half. For defense-contractor scopes specifically, see the CMMC practice page.

Do you provide ongoing monitoring after the audit is complete?

Yes, through the DeFi Protocol Security Retainer. The retainer includes monthly threat-intelligence briefings on attacks affecting comparable protocols, quarterly delta audits of new and upgraded contracts, Forta-style behavioral monitoring on configured contract addresses, governance-proposal review with security recommendations, and an incident-response slot on call. Many of our customers begin with a single audit, ship to mainnet, and convert to the retainer once the protocol is generating value worth defending continuously. The retainer cadence is the right structural answer for any protocol that is going to keep evolving on-chain, which is most of them.

Get the Scoping Call

Talk to the Auditor Before You Decide

A 30-minute scoping call produces a real quote, a real calendar, and a real conversation with a senior security engineer (not a sales rep). If you are in active loss, skip the call schedule and dial direct. Petronella Technology Group has operated from 5540 Centerview Dr., Suite 200, Raleigh, NC 27606 since 2002.