Section 1 of 7: Intro
[ Autonomous Red Team for Web3 ]

AI builds fast. We make it safe.

You can’t secure AI-speed development with human-speed security.Veritas protects the code, the cloud, and everything between.

View security overview
// MODULE_PREVIEW01 / 5

Continuous Recon

[ RECON ]

Maps every host, identity, and credential across your stack.

redteam · live attack graph
LIVE
neo4j · attack_surface · live
[ click any node for details ]
ProtocolSubdomain · ReconAPI · FrontendCloud · IPFS · KMSRepo · JS bundleWallet-connectExploit chain
28 nodes35 edges14 risks · 14 chains
0.0+
Assets Scanned
0
Findings Filed
0.0%
Coverage
0
Chains Monitored
[ Trusted By ]
// ZKSYNC// XDC// WORLD// UNICHAIN// TAIKO// SWELL// SUI// SONIC// SOLANA// SEI// SCROLL// POLYGON// PLASMA// OPTIMISM// OPBNB// MOONRIVER// MOONBEAM// MEMECORE// MANTLE// LINEA// KATANA// HYPEREVM// GNOSIS CHAIN// FRAX// ETHEREUM// CELO// BNB CHAIN// BLAST// BITTORRENT CHAIN// BERACHAIN// BASE// AVALANCHE// ARBITRUM ONE// ARBITRUM NOVA// APECHAIN// ABSTRACT// ZKSYNC// XDC// WORLD// UNICHAIN// TAIKO// SWELL// SUI// SONIC// SOLANA// SEI// SCROLL// POLYGON// PLASMA// OPTIMISM// OPBNB// MOONRIVER// MOONBEAM// MEMECORE// MANTLE// LINEA// KATANA// HYPEREVM// GNOSIS CHAIN// FRAX// ETHEREUM// CELO// BNB CHAIN// BLAST// BITTORRENT CHAIN// BERACHAIN// BASE// AVALANCHE// ARBITRUM ONE// ARBITRUM NOVA// APECHAIN// ABSTRACT
The Vibe Coding Gap

Code is generated in seconds. Security takes weeks.

Dev teams are shipping AI-generated code at lightspeed. But this “vibe coding” quietly introduces infrastructure vulnerabilities, unvalidated parameters, exposed staging routes, leaked keys, that manual reviews miss. You can’t secure AI-speed development with human-speed testing.

AI Codegen · Liveclaude_code · 12.4ms

Ships in seconds

> AI assistant · merged & deployed
POST /api/admin/users/:idstreaming
router.post("/admin/users/:id", async (req, res) => {
  const { id } = req.params;
  // TODO: add auth check
  const data = req.body;
  await db.users.update(id, data);
  res.json({ ok: true });
});
+42 linesPR #4821 · merged 38s ago
  • No auth check on privileged route
  • Body forwarded to DB without validation
  • Reviewed by humans · 11 PRs in queue
Production · CriticalCVSS 9.4 · BOLA

Silently deployed

> Discovered by Veritas RedTeam · 4m later
Finding · BOLA-2026-0418verified · exploitable
$ curl -X POST api.acme.xyz/admin/users/42 \
    -H "Authorization: Bearer USER_TOKEN" \
    -d '{"role":"admin","email":"attacker@evil.io"}'

→ 200 OK  { "ok": true }
→ Privilege escalation in 1 request.
Severity: CRITICALAuto-filed PR with patch
  • Caught before any human review
  • Continuous, runs every push
  • Fix proposed in the same minute

Autonomous AI development needs an autonomous AI red team.

LIMITED · 50 SLOTS/ BETA DROP 01

Reserve your free
RedTeam scan.

The first 50 verified protocols get a full baseline scan: reconnaissance, attack-surface graph, and a signed risk report, on the house. No card. No commitment.

  • Full reconnaissance across domains, RPCs, APIs, and signers
  • Agent-driven exploit chains executed in sandboxed Kali containers
  • Veritas-grade risk score and remediation diffs delivered as a signed PDF
  • Direct line to the RedTeam engineering cohort during onboarding
Verified protocols only, you'll need a public domain or verifiable contract address.
[ COHORT 01 ]
16/ 50 reserved
Remaining
34
Verified protocols only
No card required·No commitment·Verified protocols only
All capabilities, one surface

Same surface. Two engines.

Watch the call-graph morph into a live network of hosts, endpoints, and identities.

Source engineSurface engineHot-path tracingAuto-fixPool-backed proofLive ops
[ click any node for details ]
[ attack-surface graph ]tracing source
users.controller.tsPOST /api/v1/usersdb.exec()postgres-prod-1jwt.sign()auth.veritas.ios3.put()s3://admin-backupsroles.guard.tsiam:role/adminconfig/env.tsvault://prod/envmain.bundle.jscdn.veritas.iorpc.handler.gorpc.veritas.io:8545secret: HS256okta:user/svc-botinfra/s3.tfedge-gw-1queue.worker.tskafka://payoutsmetrics.exporterprom.veritas.io
[ how to read this graph ]
  • Click any node to inspect the file, host, or finding.
  • Toggle Source / Surface to morph between the two engines.
  • Move your cursor over the graph for parallax depth.
source surface hot path
12 nodes · 14 edges
The Gap

Most Web3 hacks don't start on-chain.

They start in an unvalidated parameter, a leaked API key, a forgotten staging server, or a vulnerable admin route. Smart contract audits can't see any of it.

On-chain · Livev.audit_02

Veritas Smart Audit

> AI-native auditing platform

AI-driven analysis of Solidity, Move, and Rust contracts. Catches reentrancy, oracle manipulation, and access-control flaws before deploy. Live across 35 EVM chains at 94.9% accuracy.

[ accuracy · 12wk ]
94.9%
accuracy
35
chains
<3s
scan time
[ recent fixes ]
> reentrancy patched, vault.sol:142
> oracle bound added, feed.ts:88
> gas refund logic fixed, mint.sol:54
> tx.origin removed, router.sol:31
> reentrancy patched, vault.sol:142
[ protects ] · contracts · governance · oracles
Try Smart Audit
Off-chain · Incomingv.redteam_01

Veritas RedTeam

> autonomous offensive agents

Autonomous AI agents continuously audit your repositories and attack your live infrastructure: source code, subdomains, APIs, cloud, frontends, and developer secrets across GitHub and CDN bundles.

[ live ops ]
> recon: admin.acme.xyz discovered
> exploit: BOLA on /graphql confirmed
> secrets: AWS key in main.bundle.js
> graph: 12-hop path materialized
> recon: admin.acme.xyz discovered
1.4M+
subdomains
6
AI agents
24/7
coverage
[ protects ] · code · APIs · cloud · frontends · secrets
Request RedTeam access
Code-to-Cloud

Two engines. One attack surface.

The Source Engine traces every data flow inside your repository. The Surface Engine attacks the deployed system. Findings cross over so a flagged line of code becomes a confirmed live exploit, not a backlog ticket.

Static · Repo-sidev.source_01

Source Engine

> recursive white-box auditor

Recursive AI passes ingest your repository, chunk by chunk, tracing call chains, taint flows, and trust boundaries until every claim is backed by a file path and a line number.

8
recursive passes
file:line
evidence
PoC
runnable output
[ analyzer ]pass 6/8
+ src/api/payouts.ts> tracing taint flow! sink: db.exec(query)>> evidence: line 84+ src/auth/jwt.ts> verifying signer trust~ weak HS256 secret>> evidence: line 27+ src/api/payouts.ts> tracing taint flow! sink: db.exec(query)>> evidence: line 84+ src/auth/jwt.ts> verifying signer trust~ weak HS256 secret>> evidence: line 27
[ catches ] · injection · authz gaps · memory bugs · logic flaws
live12,480 findings filed
Dynamic · Live targetv.surface_01

Surface Engine

> live exploitation agents

Containerized exploitation agents work the live attack surface from a 3D Neo4j graph: domains, ports, endpoints, identities, and CVEs, all chained into proof-of-impact actions.

80+
recon tools
5
graph layers
per deploy
re-test
[ live graph ]5 paths
[ catches ] · SSRF · authz · takeovers · leaked keys · CVE chains
armed1.4M+ assets watched
Source flags itGraph prioritizes itSurface confirms it
Capabilities

An entire offensive security team, on autopilot.

Six AI agents work in parallel: source auditing, recon, exploitation, graph intelligence, credential hunting, and reporting, with continuous monitoring across every commit and every deploy.

1 resolver: async (_, args, ctx) => {
2 const w = await getWallet(args.id);
3 return w.transfer(args.to, args.amount);
4 }
5 // CypherScan: BOLA suspected
6 // owner check missing
Source Engine

Recursive AI audit of your repository.

Multiple agent passes trace data flows from entrypoint to sink, citing the exact file and line for every finding.

  • Per-commit incremental scans
  • Cross-service taint tracking
  • Findings linked to live exploit replays
[ ops log ]live
  1. 00:02ingest 184 files
  2. 00:07trace auth flow
  3. 00:11sink: wallet.transfer
  4. 00:13BOLA suspected
apiadminstagerpcacme.xyz
Surface Recon

Map every attackable surface, continuously.

Subdomains, APIs, RPC nodes, S3 buckets, frontends. Recon agents fingerprint and re-walk your perimeter on a loop.

  • Passive + active discovery
  • Drift alerts on new endpoints
  • Severity-weighted target queue
[ ops log ]live
  1. 00:01resolve acme.xyz
  2. 00:04+ 3 subdomains
  3. 00:08+ /admin (open)
  4. 00:09queue 12 targets
POST /graphqlpayload staged
401
blocked
200
bypass
PoC
signed
artifactcid: bafy...4xq
Exploitation

Confirmed exploits, not theoretical risk.

Agents stage proof-of-impact payloads in your sandbox, screenshot the result, and sign the artifact for replay.

  • Read-mostly by default
  • Per-scope action gating
  • Signed PoC + IPFS receipt
[ ops log ]live
  1. 00:00stage payload
  2. 00:03send /graphql
  3. 00:04auth bypass: 200
  4. 00:05sign artifact
Attack Graph

Every finding, fused into one path.

Static and dynamic findings land in a 3D Neo4j attack-surface graph so you see the chain, not just the leaves.

  • Code lines linked to live hosts
  • Reachability scoring per asset
  • One-click pivot to dashboard
[ ops log ]live
  1. 00:01merge 18 nodes
  2. 00:02edge: api -> db
  3. 00:03path to root: 3 hops
AWS_ACCESS_KEY_ID
AKIA...7QF
STRIPE_SECRET
sk_live...x9
PRIV_KEY (eth)
0x4f...c2
GH_PAT
ghp_...mZ
2 live · 2 stalerotate queued
Credential Hunt

Find leaked keys before they are weaponized.

Dorking, paste-monitor, and history-walk agents hunt your secrets across public corpora and validate liveness safely.

  • Repo + paste + archive sweep
  • Liveness probe in sandbox
  • Auto-rotate hooks for partners
[ ops log ]live
  1. 00:01scan 412 repos
  2. 00:05match: AWS_*
  3. 00:06validated live
  4. 00:07rotate queued
A-
security score
842
/ 1000
1
crit
3
high
7
med
Reporting

Audit-grade reports, machine and human.

Every run produces a signed PDF, a JSON feed for your SIEM, and a delta diff against the previous baseline.

  • PDF + JSON + SARIF outputs
  • Severity grade with CVSS rationale
  • Diff vs previous run
[ ops log ]live
  1. 00:01compile findings
  2. 00:02render PDF
  3. 00:03score: A- (842)
  4. 00:04publish receipt
How It Works

From scope to proof in one pipeline.

Static findings from your repository and dynamic findings from your live surface land in the same 3D Neo4j attack-surface graph, embedded right in your Veritas dashboard.

step 1

Discover

Map every domain, API, repo, and asset linked to your protocol.

step 2

Map

Build a live attack-surface graph of identities, services, and trust.

step 3

Exploit

AI agents safely chain payloads to prove real-world impact.

step 4

Report

Engineer-grade findings with reproducible exploits and fixes.

Live Ops

Your AI security [ ops console ].

Six autonomous agents working your perimeter 24/7 - surfacing exploit chains, leaked secrets, and broken auth before attackers do.

live ops feed01 / 07
$ [ recon ] → 1,438 subdomains enumerated
● online
[ Continuous Recon ]

Subdomains, ports, cloud assets, leaked repos - mapped every hour.

load
92%
● online
[ Exploit Chains ]

Multi-step proof-of-impact attacks built by autonomous agents.

load
78%
● online
[ Graph Intelligence ]

Every asset, identity, and key plotted into one attack graph.

load
84%
● online
[ Secret Hunting ]

Frontend bundles, GitHub, CDNs scanned for live credentials.

load
96%
● online
[ Live Monitoring ]

Re-tests fire on every deploy - minutes, not weeks.

load
88%
● online
[ Proof-Filed Reports ]

CVSS-scored findings shipped straight to Linear, Jira, and GitHub.

load
100%
[ early_access · cohort_01 ]

Boot your AI red team [ now ].

Limited slots open this quarter for design-partner teams. White-glove onboarding, direct line to the engineers building it.

Request early access
Engineer-Grade Reports

Findings your engineers can ship against.

Every finding ships with a reproducible exploit, blast-radius analysis, the exact graph path, and a fix recommendation written for the team that owns the system.

  • Source-traced root cause, not just a live symptom
  • CVSS-scored severity with business-impact context
  • One-click reproduction with sanitized payloads
  • Auto-generated tickets for Linear, Jira, GitHub
  • Continuous re-validation after every commit and deploy
[ report shipped to ]delivered
Slack
#sec-incidents
Linear
SEC-482
Email
security@
Security Grade · F
Signed · IPFS
[ Risk Score ]
0
endpoints
2,481
nodes
482
edges
1,103
containers
37
[ Findings · 38 ]
4 CRIT11 HIGH23 MED
crit
SQL Injection on /api/v1/users
users.controller.ts:84
CVSS9.8
crit
JWT secret leaked in client bundle
main.bundle.js
CVSS9.4
high
Exposed AWS S3 bucket: /admin-backups
infra/s3.tf
CVSS8.2
high
Privileged RPC method open to public
rpc.handler.go:201
CVSS7.6
med
Outdated Nginx 1.18, CVE-2021-23017
nginx.conf
CVSS6.1
low
Verbose error pages in production
app.config.ts
CVSS3.2
Agent loop · 6 attack paths verified in sandbox
Report · veritas-redteam-2026-04.pdf
CypherFix

From finding to fix, [ autonomously ].

CypherFix turns every confirmed finding into a reviewable patch. AI agents read the affected service, write the minimal fix, open a PR in your repo, and re-validate after merge.

  • 1
    Finding detected
    RedTeam confirms exploit chain with proof-of-impact.
  • 2
    CypherFix drafts patch
    AI agent reads the affected code and generates a minimal, scoped fix.
  • 3
    PR opened in your repo
    Patch lands as a reviewable pull request - never auto-merged without you.
  • 4
    Re-validated post-merge
    RedTeam reruns the exact attack path and signs off the fix.
Human-in-the-loop · Never auto-merged
cypherfix/patch · #482
open
Fix BOLA on /graphql · scope: balance.transfer
cypherfix-bot wants to merge 1 commit into main
1 resolver: async (_, { to, amount }, ctx) => {
2- return wallet.transfer(to, amount);
3+ if (!ctx.user || ctx.user.id !== wallet.ownerId) {
4+ throw new ForbiddenError("not_authorized");
5+ }
6+ return wallet.transfer(to, amount);
7 }
checks passed exploit re-tested · blocked
review
[ patch timeline ]18s end-to-end
  1. 00:14finding confirmed
  2. 00:21patch drafted
  3. 00:24PR opened
  4. 00:27checks green
  5. 00:31exploit retested
  6. 00:32ready for review
+5 / -1
lines
1
file
balance.transfer
scope
[ re-validation ]signed by cypherfix-bot
unit
pass
integration
pass
exploit-replay
blocked
Scan Profiles

169 settings, distilled into three profiles.

No knobs to tune. Pick a profile, set scope, click run. Every profile is fully scriptable when you're ready.

[ passive ]
Light Recon

External-only mapping. Subdomains, DNS, public repos, leaked secrets. Zero traffic to your apps.

intensity25%
  • Subdomain + ASN sweep
  • GitHub & CDN secret scan
  • OSINT only · no payloads
[ balanced ]
Standard Pentest

Default RedTeam mode. Safe payloads, authz checks, API replay. Production-aware.

intensity65%
  • Recon + safe exploit chains
  • API & GraphQL fuzzing
  • Wallet-connect surface tests
[ deep ]
Aggressive Red Team

Full adversary simulation in scopes you authorize. Privilege escalation, lateral movement, IMDS pivots.

intensity95%
  • Privesc + lateral chains
  • Cloud / IMDS pivot
  • Continuous re-attack
The Suite

Full-stack Web3 security, one platform.

One login for Smart Audit, Explorer, and RedTeam. Smart Audit and Explorer are live today - RedTeam is next.

RedTeam
Code-to-Cloud offensive security
Coming soon
6 agents
DeFi Guardian
Real-time threat monitoring
soon
Insurance
Capital protection pool
soon
Roadmap

What ships next.

A live preview of capabilities entering the Veritas RedTeam pipeline. Auto-cycling - click a card to inspect.

Autonomous Patch Synthesis
shipping Q3 '26 · AI · CODE
// patch.diffPR #1042 · ai-synth
-if (token == admin) { … }
-fetch(`${API}/exec?cmd=${q}`)
-// TODO: validate origin
+if (verifyRole(token, ADMIN)) {
+fetch(`${API}/exec`, { body: safe })
+assertSameOrigin(req)

Findings ship as ready-to-merge pull requests with proofs and tests.

  • LLM-authored fixes scoped to your repo style
  • Regression tests generated alongside each patch
  • One-click revert with full audit trail

200+ teams already in line.

Early access opens soon for a small group of design-partner teams, hand-picked to shape the engine before public launch. Limited slots. No extensions.

No spam. Encrypted at rest. Unsubscribe anytime.

Sandboxed onboarding. Read-only by default. No spam, unsubscribe anytime.

[ Wiki ]

Questions, answered.

Everything you need to know about Veritas RedTeam: what it is, how the agent pipeline runs end to end, what it touches in your stack, and how to get a slot.