Turn risky diffs into executable proofs. Block unsafe merges.
Paythos runs in your CI on every commit. It generates vulnerability hypotheses, writes Foundry tests to confirm or falsify them, and posts a Pass / Warn / Block verdict with reproducible evidence.
Not a report. A status check. We don't just detect — we generate the failing test.
7-day proof pilot. If it doesn't run and produce verdicts, you get your money back.
You don't lose because you "ignored security."
You lose because one small change ships a dangerous regression.
Common ways teams get hurt:
A PR silently weakens access control
criticalA new external call introduces a reentrancy window
criticalAn upgrade breaks storage layout
highAccounting math drifts under edge cases
highTests pass, but they don't prove the critical properties
mediumManual review can't reliably catch this at PR speed. Tool output is noisy. Audits come later.
You need a gate that stops bad releases now.
What Paythos does
On every PR/commit, autonomous agents:
Recon: maps the attack surface
Autonomous recon agent scans the codebase, identifies contracts, slices relevant code, and maps privileges, external calls, storage layouts, and accounting paths.
Hypothesis: generates attack theories
Generates concrete vulnerability hypotheses tied to specific code locations — access control gaps, reentrancy paths, accounting bugs, and more.
Test architect: writes Foundry tests
For each hypothesis, generates Foundry tests — reproducers, invariant checks, and bounded fuzz tests — designed to confirm or falsify it.
Execute & review: iterates until confident
Attaches evidence & learnings
Full artifacts: generated test code, execution logs, hypothesis verdicts, agent timeline, and global learnings persisted for future runs.
What you get on every PR
A clear decision
Pass / Warn / Block, with the top reasons.
Proof you can rerun
Commands, versions, and the generated tests that triggered the verdict.
Diff-aware signal
No generic report dumps. Only the changes that matter.
Continuously enforced critical properties
Your non-negotiables are checked every time.
The checks we enforce
Examples of what we gate:
Access control regressions
on privileged functions
External-call paths
with unsafe state ordering
Upgrade safety
storage layout + initializer + upgrade auth checks
Oracle validation
and staleness bounds
Accounting invariants
for shares, fees, debt, and withdrawals
Token interactions
dangerous approvals & edge cases
(You choose your critical properties. We start with a proven baseline.)
How it works
Fit check
We confirm stack and repo readiness (Foundry/Hardhat, upgrade patterns, CI).
Install the CI gate
GitHub Actions / GitLab CI status checks + PR bot comments.
Tune to low-noise
We set baselines, suppress known false positives, and focus on high-risk deltas.
Ship with confidence
Every PR gets a verdict and evidence. Bad merges get blocked.
Fit check
We confirm stack and repo readiness (Foundry/Hardhat, upgrade patterns, CI).
Install the CI gate
GitHub Actions / GitLab CI status checks + PR bot comments.
Tune to low-noise
We set baselines, suppress known false positives, and focus on high-risk deltas.
Ship with confidence
Every PR gets a verdict and evidence. Bad merges get blocked.
Who this is for
Ideal for
Solidity teams shipping weekly (or faster)
Protocols with upgrades, roles/permissions, or complex accounting
Teams where one bad release is existential
Not for
Teams shipping rarely with no CI discipline
Repos with no tests and no willingness to add them
7-day proof pilot
We're not asking you to believe. We'll prove it on your code.
one-time · money-back guarantee
In 7 days, you get:
Guarantee: If we can't get it running and producing verdicts with evidence in 7 days, you get your money back.
FAQ
Stop shipping bugs. Start shipping confidence.
7-day proof pilot. If we can't get Paythos running and producing verdicts with evidence, you get your money back.