Process

A clear, safety-first workflow focused on evidence and verifiable details.

1) Case intake

You provide a structured incident narrative and timeline, plus public identifiers (addresses, transaction hashes, and exchange ticket IDs). We explicitly block secrets.

2) Triage & validation

We classify the event, de-duplicate signals, and validate what can be corroborated from public blockchain data and artifacts you can safely provide.

3) Assessment summary

You receive a concise assessment brief: findings, confidence boundaries, and recommended next steps—along with a transparent statement of limitations.

Disclaimer: We do not custody funds. Outcomes vary by scenario.