NODE-CONSTANT//SRF-02 · FORGEHARDEN
WICK / 04//45.5°N · 73.5°W
← SURFACES/SRF-02HARDEN
Core Verification

Forge

Formal security for smart contracts.

Formal vulnerability detection for Solidity and EVM contracts. Forge analyzes contract structure, call graphs, state transitions, and taint propagation to identify provable failure conditions in transaction-critical code. Built for protocol teams, auditors, and technical diligence on high-value deployments.

8
SWC Classes
<30s
Scan Time
$0
Test Capital
§ SPECIFICATION
Input
  • Solidity source (.sol) or ABI + bytecode
  • Deployment parameters and constructor arguments
  • Optional: invariant specifications in SMT-LIB2
Constraints Verified
  • Reentrancy reachability under adversarial call sequences
  • Integer overflow in token arithmetic
  • Access control bypass via delegatecall
  • Flash loan oracle manipulation paths
  • Uninitialized storage slot reads
  • Timestamp dependence in critical branches
Output
  • Z3 proof artifacts per vulnerability class
  • Call graph with taint propagation paths
  • State transition violation certificates
  • SWC registry cross-reference
§ SAMPLE PROOF ARTIFACT
ARTIFACT // FORGE-RE-01FAILURE DETECTED
// SAMPLE PROOF — FORGE ENGINE

ERC4626 vault — reentrancy in withdraw()

TargetCustom ERC4626 implementation
Conditionmalicious receiver calls back before balance update
VerdictSAT
SummaryState drain reachable via 2-hop reentrancy. Proof trace: withdraw→callback→withdraw.
StatusReview-ready
→ View full artifact repository
§ FIELD VALIDATION
#TargetVulnerability ClassStatus
01Balancer V3
Reentrancy
ReentrancyFixed
02Euler V2
Flash Loan Oracle
Flash Loan OracleACK
03Morpho Blue
Access Control
Access ControlFixed
Run Forge on your system.

Formal engagement starts with a technical intake. We scope, configure, and deliver a proof artifact within the agreed SLA.

Request Briefing →