Process
A clear, safety-first workflow focused on evidence and verifiable details.
1) Case intake
You provide a structured incident narrative and timeline, plus public identifiers (addresses, transaction hashes, and exchange ticket IDs). We explicitly block secrets.
2) Triage & validation
We classify the event, de-duplicate signals, and validate what can be corroborated from public blockchain data and artifacts you can safely provide.
3) Assessment summary
You receive a concise assessment brief: findings, confidence boundaries, and recommended next steps—along with a transparent statement of limitations.
Disclaimer: We do not custody funds. Outcomes vary by scenario.