www.zellic.io
Open in
urlscan Pro
2606:4700:20::681a:fb4
Public Scan
Submitted URL: http://zellic.io/
Effective URL: https://www.zellic.io/
Submission: On June 19 via api from US — Scanned from DE
Effective URL: https://www.zellic.io/
Submission: On June 19 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
LOOKING FOR ZELLIC LOGOS? You can find the logo assets in our brand kit. Download assets ↗ ServicesOur workResearchTeamContact Request a quote ↗ ServicesOur workResearchTeamContact REAL SECURITY. NOT RUBBER STAMPS. Zellic specializes in securing emerging technologies. Developers, founders, and investors trust our security assessments to ship quickly, confidently, and without critical vulnerabilities. With our background in real-world offensive security research, we find what others miss. What we do ↗ Have us review your code ↗ PlayPause WE KEEP WINNERS WINNING. We’re home to the best hacking and vulnerability research talent across the globe, earning us the reputation as the go-to security firm for teams whose rate of innovation outpaces the existing security landscape. View past clients ↗ AUDITS THAT STOP BUGS. Let the numbers do the talking. Here's how we did in 2023: Read our reports ↗ PlayPause PlayPause PlayPause 1 2 3 1 55% of assessments In 51 out of 93 reviews, we identified high impact findings. Over half of codebases had serious, latent security issues. 2 42 Critical findings Our security assessments prevented 42 critical, product-killing vulnerabilities from shipping. That's 42 hacks stopped. 3 126 High impact findings Finding serious issues is our “normal”. What's lurking in your codebase? > Zellic is an incredible and fast moving auditing team — on top of extremely > timely, technical, and precise responses when asked, they also have found > extremely unique and detailed obscure bugs down to the level of the Solidity > quirks. The team’s diverse and deep security and hacking experience shows > through in conversations, brainstorming, and technical discussions. — Ante > It’s been really good actually. I liked the dialogue and general engagement > which is much better than some other places. It makes it feel like we’re > working with our own guys as opposed to a third party. — Wintermute > We worked with Zellic on a security review of our ZK circuits and associated > smart contracts. They were extremely thoughtful in searching for areas where > our circuits might be underconstrained. The end report was quite thorough, > especially in explaining which areas they probed, which gave us much more > confidence in our circuit security. We would enthusiastically work with Zellic > in the future. — Yi Sun, Co-Founder of Axiom > The Zellic team was a joy to work with. Their auditors moved fast, were able > to quickly dive into the details of a large and complex codebase, and it was > clear they had a real focus on real security over security theater. I would > highly recommend any developer in this space put them on speed dial. — Ambient Finance > Zellic has been a great partner in securing the Sui ecosystem. They have found > important bugs in both Sui protocol code and in Sui applications. My favorite > thing about the folks at Zellic is their curiosity — you can tell they are > seeking to deeply understand the systems and code they study, not just pattern > match. — Sam Blackshear, CTO at Mysten Labs > We have collaborated with Zellic on both the zkEVM circuit and smart contract > auditing. Zellic team is truly outstanding in their technical prowess and > professionalism. We are extremely impressed that they managed to find subtle > bugs among the intricate constraints in the zk circuits. Our auditing > experience with Zellic was both insightful and enjoyable. — Haichen Shen, Co-Founder of Scroll ← Previous → Next WE’LL NEVER LEAVE YOU ON READ. View our case studies ↗ View our services ↗ DEVELOPERS AND FOUNDERS RAVE ABOUT ZELLIC. Zellic began with a mission to deliver the best security assessments in the world. We saw a maze of subpar providers running automated tools with zero client input. Your team deserves better. We dive deep to find the unexpected ways things can break. WE TALK TO YOU EVERY DAY. We keep you involved in the review process from start to finish. We ask questions. If you want us to apply certain techniques, like formal verification or fuzzing, we listen. And at each step, we walk your team through how we’re going to accomplish things. ACCESS TO THE BEST HACKERS IN THE WORLD. Before Zellic, we founded the #1 CTF team worldwide. These CTF competitions attract world-renowned security researchers and white hats to exploit web, desktop, and mobile apps and cryptographic code. With us, that incredible talent secures your software. OUR SPECIALIZATIONS Asterisk EVM (Ethereum Virtual Machine) ↗ Asterisk Zero-Knowledge Circuits ↗ Asterisk Web Application Security ↗ Asterisk Applied Cryptography ↗ Asterisk Secure Enclaves, TEEs, and Trusted Computing ↗ Asterisk Formal Verification, Static Analysis, and Fuzzing ↗ Asterisk L1s, L2s, and Roll-Ups ↗ Asterisk Cross-Chain Apps ↗ Asterisk DeFi Primitives ↗ Asterisk Aptos and Sui (Move) ↗ Asterisk Cosmos ↗ Asterisk Solana ↗ OUR HACKERS DEFEND YOU. Our engineers bring a rich set of skills and backgrounds, including cryptography, web security, mobile security, low-level exploitation, and finance. Learn about our team ↗ Asterisk STEPHEN TONG Co-Founder Asterisk JASRAJ BEDI Co-Founder LEARN ABOUT SECURITY FROM THE BEST. We’re committed to research and open source. Read the latest research from our team. View all articles ↗ SECURE YOUR FUTURE WITH ZELLIC. Top organizations rely on Zellic to protect their systems. Give your users the security they deserve. Let's talk security ↗ WORK AT ZELLIC. Safety standards are written in blood. Join us in building security solutions that advance the software industry and address the major deficiencies in software security. View current openings ↗ ABOUT US Services ↗ Team ↗ Careers ↗ Contact ↗ WHAT WE DO Our work ↗ Research ↗ Reports ↗ Forky ↗ FOLLOW US Telegram ↗ Twitter ↗ GitHub ↗ Zellic © 2024 Privacy policy ↗ Back to top ↑