Counterscarp combines AI, cross-chain analysis, and automated exploit generation into a unified security platform. 14 analyzers free — up to 21 with Pro.
The AI Audit Copilot uses Retrieval-Augmented Generation (RAG) to provide real-time vulnerability context during audits. It queries a curated knowledge base of historical exploits, audit reports, and EVM/Solana-specific vulnerability patterns.
# AI Audit Copilot usage from counterscarp import AuditCopilot copilot = AuditCopilot(model="gpt-4") # Query vulnerability context context = copilot.query( finding="reentrancy in withdraw()", contract="Vault.sol" ) # Returns: historical exploits, # remediation steps, severity score print(context.similar_exploits) # [{"protocol": "Cream Finance", # "loss": "$130M", "year": 2021}]
Interactive D3.js graphs map multi-contract attack vectors across EVM and Solana chains. Reveals complex exploit chains — flash loans, reentrancy cascades, oracle manipulation — that single-contract analyzers cannot detect.
Git-based historical vulnerability tracking detects when vulnerabilities were introduced, tracks security regressions across commits, and provides temporal audit trails. Run counterscarp scan ./contracts --commits HEAD~50..HEAD to scan the last 50 commits.
The only tool that validates Solana Anchor IDL constraints and CPI (Cross-Program Invocation) flow security. Detects missing signer checks, unconstrained accounts, and dangerous CPI patterns that Rust static analyzers miss.
Auto-generates security pipeline configurations for GitHub Actions, GitLab CI, and CircleCI. Configurable severity thresholds block PRs containing critical vulnerabilities. The fastest path from zero to automated security.
Automatically generates working Foundry test cases that demonstrate detected vulnerabilities as actual exploits, complete with setup, execution, and assertions. Transforms findings into actionable proof-of-concepts for bug bounty submissions and developer education.
Compares codebases against a database of known vulnerable patterns, forked protocols, and public exploits to identify "genetic" vulnerabilities inherited from upstream code. Many protocols fork from Uniswap, Compound, or OpenZeppelin — this scanner finds inherited vulnerabilities they may have overlooked.
| # | Analyzer | Type | Chain | Patterns | Tier |
|---|---|---|---|---|---|
| 01 | Heuristic Scanner | Static | EVM | 23 EVM heuristic rules | Free |
| 02 | Slither | Static (Trail of Bits) | EVM | 80+ detectors | Free |
| 03 | Aderyn | Static (Cyfrin Rust) | EVM | Complementary to Slither | Free |
| 04 | Liar Detector | NatSpec Analysis | EVM | Comment vs implementation | Free |
| 05 | Access Matrix | Permission Analysis | EVM | Function access control | Free |
| 06 | Upgrade Diff | Storage Analysis | EVM | UUPS/proxy collision detection | Free |
| 07 | Solana Analyzer | Static | Solana | 35 Rust/Anchor patterns | Developer |
| 08 | Medusa | Fuzzing | EVM | Coverage-guided | Free |
| 09 | Foundry | Invariant Testing | EVM | Property-based tests | Free |
| 10 | Mythril | Symbolic Execution | EVM | Bytecode analysis | Free |
| 11 | Supply Chain | Dependency Scan | Both | OSV.dev integration | Free |
| 12 | Threat Intel | Historical DB | Both | Code4rena, Immunefi, Solodit | Free |
| 13 | Knowledge Fetcher | Research | EVM | EVM vulnerability research | Free |
| 14 | Inflation Scaffold | Attack Generation | EVM | ERC4626 attack tests | Free |
| 15 | AI Audit Copilot | AI/RAG | Both | LLM + knowledge retrieval | Pro |
| 16 | Attack Path Visualizer | Visualization | Both | D3.js attack graphs | Pro |
| 17 | Time-Travel Scanner | Historical | Both | Git-based regression tracking | Pro |
| 18 | Anchor IDL Validator | IDL Analysis | Solana | CPI flow security | Developer |
| 19 | CI/CD Generator | Automation | Both | GitHub/GitLab/CircleCI/Azure/Jenkins | Free |
| 20 | Exploit Generator | PoC Generation | EVM | Foundry test generation | Pro |
| 21 | Fingerprint Scanner | Similarity | Both | Protocol genealogy analysis | Pro |
Start free with 14 analyzers — no account needed. Upgrade to Developer for Solana support, Pro for AI Copilot, Attack Graph, and Exploit PoC, or Team for shared workspaces.