Exploit validation for smart contract security teams

Validate smart contract exploitability before attackers do.

Hunter turns security findings into repo-native PoCs, controlled validation runs, and sponsor-ready evidence for smart contract security teams.

From finding to proof—in minutes, not days.

Exploit-aware detection Runnable PoC generation Repo-native harness lifting Structured validation and evidence

How Hunter works

1

Scan and prioritize

Hunter detects likely exploit families and ranks the shortest path from suspicion to proof.

2

Generate repo-native scaffolds

Hunter emits PoC starters that fit the target repository’s real harness and test layout.

3

Run controlled validation

Hunter executes the generated path in a bounded environment and classifies the observed result.

4

Export evidence and remediation context

Hunter links findings, probes, logs, traces, and likely fix direction into sponsor-ready output.

Why Hunter is different

Exploit-aware by design

Hunter prioritizes exploit families instead of stopping at flat alerts, helping operators focus on the shortest path from suspicion to proof.

Native to the target repo

Hunter generates proof scaffolds that fit the target repository’s own test layout and harness, reducing wasted time and fake setup.

Built for validation and evidence

Hunter links generated probes, observed failures, logs, traces, and remediation context into structured outputs for real audit workflows.

Phoenix Bonds: from alert to proof shape

Hunter was used to drive a repo-native validation flow around an underwater-settlement failure shape in Phoenix Bonds.

Workflow

  • exploit-family prioritization
  • generated AVA repo-native probes
  • harness-lifted two-user exit-order scenarios
  • observed later-user degradation after first-user exit

Observed result

  • Alice exited first after the price moved against pending notes
  • Bob’s later cancel path failed with a zero-transfer panic
  • Bob’s later commit path failed with an overflow panic
  • Bob’s pending note remained stuck after Alice exited first

This is the workflow Hunter is built for: not just finding suspicious code, but producing reproducible exploit evidence tied to the target repository’s real harness.

Product-first smart contract security

Hunter is a product-first smart contract security platform focused on exploit validation.

Not a generic scanner. Not an audit marketplace. Built for teams that need stronger proof, better evidence, and faster exploit confirmation.