


Most audit tools stop at the report. We don't. After your audit, our AI patches each vulnerability, re-runs the full detector suite, and hands you a verified-clean contract — no security engineer required.
Logic-preserving. Patch-reviewed. Re-audited. Every time.
From vulnerable to verified in four steps
Run a full audit on your contract. Our 34 detectors and three-tier AI engine surface every vulnerability, ranked by severity and exploitability.
From your audit report, select which findings you want repaired. Each vulnerability is individually priced — fix what matters most within your budget.
Our AI analyzes your entire contract context, generates a minimal targeted patch, and explains every change. No unnecessary rewrites. No logic changes without your approval.
The patched contract runs through our full audit pipeline again. Only when it passes clean does it get stamped with the Audithunt Repair Certificate.
// ❌ VULNERABLE — Reentrancy
function withdraw(uint256 amount) external {
require(balances[msg.sender] >= amount, "Insufficient");
// State NOT updated before external call
// An attacker's fallback can re-enter here
(bool ok, ) = msg.sender.call{value: amount}("");
require(ok, "Transfer failed");
balances[msg.sender] -= amount; // too late
}// ✅ REPAIRED — Checks-Effects-Interactions
import "@openzeppelin/contracts/security/ReentrancyGuard.sol";
contract SafeVault is ReentrancyGuard {
function withdraw(uint256 amount) external nonReentrant {
require(balances[msg.sender] >= amount, "Insufficient");
// State updated FIRST (Effects)
balances[msg.sender] -= amount;
// External call LAST (Interactions)
(bool ok, ) = msg.sender.call{value: amount}("");
require(ok, "Transfer failed");
}
}Changes Applied
No subscriptions. No bundles you don't need. Pay only for the vulnerabilities you choose to repair.
Direct fund loss, immediate exploit risk
Examples
Serious risk, likely exploitable
Examples
Conditional risk, exploitable under specific conditions
Examples
Best practices, code quality improvements
Examples
Enterprise clients with 10+ findings get volume pricing. See Enterprise plan →
No. Our AI is constrained to apply minimal security patches only. We fix the vulnerable pattern while preserving your exact business logic. If a fix requires a logic trade-off, we flag it and ask for your approval before proceeding.
We iterate until it does, at no extra charge. If after 3 attempts a clean re-audit isn't achievable without architectural changes, we refund the repair fee and provide a detailed technical brief on what would need to change.
Yes, always. You receive a full diff showing every line changed with explanations. You approve the patch before the re-audit runs. Nothing is applied without your explicit confirmation.
Repaired contracts receive a Repair Certificate showing what was fixed and the re-audit passing report. We recommend running the repaired contract through your own test suite as well — our repair is a strong signal of safety, but your tests are the final gate.
Repair currently supports Solidity (Ethereum, BNB Chain, Arbitrum, Optimism). Cairo/Starknet repair is in development. Vyper repairs are available on the Enterprise plan.