Enterprise-grade smart contract security with 21+ analyzers, protocol signatures, and air-gapped deployment. Garrison delivers professional-grade smart contract audits in minutes — not months.
Attackers are getting faster. Manual audits are expensive and slow. Fragmented tools miss cross-contract attack vectors. Something had to change.
Teams run Slither, then Mythril, then Aderyn — each with different output formats, different false positive rates, and no unified view of risk.
A professional audit costs $30K–$100K and takes 2–6 weeks. Most teams can't afford that cadence for every deployment or upgrade.
Most tools analyze contracts in isolation. Real exploits span multiple contracts — flash loans, reentrancy chains, oracle manipulation across protocols.
From installation to client-ready report in under 5 minutes. No configuration hell. No fragmented output.
One CLI command targets your contract directory. Garrison auto-detects EVM Solidity or Solana Rust/Anchor and loads the appropriate analyzer stack.
Static analysis, AI-powered pattern matching, fuzzing, symbolic execution, and cross-chain attack path mapping all execute concurrently — no sequential waiting.
Receive a full HTML report, interactive D3.js attack graph, Markdown summary, and SARIF output for CI/CD — all in one run. No post-processing needed.
Install, configure, and run your first audit with a single command. No Docker. No cloud account required.
From AI-powered copilots to cross-chain attack visualization — built by auditors who were frustrated with what existed.
RAG-based knowledge retrieval with LLM integration surfaces real-time vulnerability context, historical exploit patterns from Code4rena and Immunefi, and concrete remediation guidance — during the audit, not after.
Interactive D3.js force-directed graphs map multi-contract attack vectors across EVM and Solana, revealing flash loan chains, reentrancy paths, and oracle manipulation routes that single-contract tools miss entirely.
Git-based temporal vulnerability tracking detects exactly when a vulnerability was introduced, which commit added it, and whether it's a regression from a previously patched issue. Audit the history, not just the snapshot.
The first tool to perform deep Solana IDL constraint and CPI flow analysis. Validates account constraints, detects missing signer checks, and maps cross-program invocation risks — a blindspot for every other EVM-focused tool.
Auto-generates ready-to-commit GitHub Actions, GitLab CI, and CircleCI configurations with customizable severity thresholds, PR blocking rules, and Slack/Discord alert webhooks. Security in every merge, zero setup time.
Automatically generates working Foundry test cases that demonstrate detected vulnerabilities as actual exploits. One-click reproduction for bug bounty submissions, client reports, and developer education — no manual PoC writing.
Compares codebases against a curated database of known-vulnerable patterns and forked protocols to identify "genetic" vulnerabilities inherited from upstream code — because most DeFi protocols fork, and most forks inherit the bugs.
We built what we wished existed. Here's how it stacks up against the tools auditors actually use.
| Capability | Garrison | Slither | Semgrep | Aderyn | Manual Audit |
|---|---|---|---|---|---|
| Static Analysis (EVM) | ✓ | ✓ | ✓ | ✓ | ✓ |
| Solana / Anchor Support | ✓ | ✗ | ✗ | ✗ | ✓ |
| AI-Powered Copilot (RAG) | ✓ | ✗ | ✗ | ✗ | ✗ |
| Cross-Contract Attack Graph | ✓ | ✗ | Partial | ✗ | ✓ |
| Exploit PoC Generation | ✓ | ✗ | ✗ | ✗ | Manual |
| CI/CD Pipeline Generator | ✓ | Manual | Partial | Manual | ✗ |
| Time-Travel Git Scanner | ✓ | ✗ | ✗ | ✗ | ✗ |
| Fuzzing Integration | ✓ | ✗ | ✓ | ✗ | Manual |
| HTML + SARIF + MD Reports | ✓ | JSON only | JSON/HTML | MD only | Manual |
| Open Source (MIT) | ✓ | ✓ | ✗ | ✓ | — |
| Cost | Free + from $49/mo | Free | $49–$499/mo | Free | $30K–$100K |
Every major security analysis technique unified in one platform. No tool-switching. No format translation. No gaps.
Whether you're filing a bug bounty, briefing a client, or blocking a CI/CD pipeline — Garrison has the format you need.
Full interactive audit report with collapsible findings, severity badges, code snippets with line highlights, and risk score visualization. Client-ready, no formatting required.
View example →D3.js force-directed graph visualizing vulnerability relationships, call chains, and multi-contract attack paths. Filterable by severity, node type, and contract.
View example →Plain Markdown for GitHub PRs, wikis, and documentation systems. Human-readable, version-control friendly, and compatible with every Markdown renderer.
Download example →Static Analysis Results Interchange Format — integrates natively with GitHub Code Scanning, VS Code, and any SARIF-compatible pipeline. Block merges on critical findings.
Download example →Security tools must be transparent. Garrison is MIT licensed, fully open source, and actively maintained.
RunTimeAdmin/garrison-engine
Full source code, issue tracker, and contribution guidelines. Inspect every analyzer, every detection pattern, every line of the AI integration.
View on GitHub →Every analyzer, every detection pattern, and every output format is covered by automated tests. CI runs on every commit. No regressions ship.
View Test Coverage →Use it, fork it, build on it
No vendor lock-in. No usage restrictions. Use Garrison in commercial audits, integrate it into your own tools, or build a business on top of it.
View License →Garrison is free, open source, and installs in one command. Run your first audit in under 5 minutes — no account, no cloud, no credit card.
Garrison Cloud is Live
Web UI, team collaboration, scheduled scans, and API access — no local install required.