Our Story

About Garrison

Built by security researchers who were tired of fragmented tools, missed vulnerabilities, and audit reports that didn't tell the full story. This is the tool we needed — so we built it.

The Origin

Why We Built This

In March 2023, Euler Finance lost $197 million to a flash loan attack. The vulnerability — a missing health check in a donation function — was detectable with static analysis. Every tool in the standard auditor toolkit had been run on that codebase. None of them caught it.

That's not a failure of effort. It's a failure of tooling. Slither doesn't understand cross-contract flash loan paths. Semgrep doesn't know the historical context of similar exploits. Aderyn doesn't generate a PoC you can hand to a developer and say "this is what an attacker would do."

Garrison was built to close those gaps — not by replacing existing tools, but by orchestrating all of them together, adding AI-powered intelligence on top, and delivering output that's actually useful to both auditors and developers.

$3.2B+
Lost to exploits in 2024
21
Integrated analyzers
638+
Tests passing
31+
Vulnerability patterns
MIT
Open source — free forever
Mission

Securing the Decentralized Future

Professional-grade smart contract security should not cost $50,000 and take 6 weeks. We're changing that.

Principle 01

Security First, Always

Every design decision prioritizes finding real vulnerabilities. We optimize for zero false negatives over minimal noise — missing a critical bug is always worse than an extra review item.

Principle 02

Radically Open Source

Security tools must be transparent. Our MIT license means anyone can inspect, audit, and improve the code. We believe the security community is stronger when we build in the open.

Principle 03

Actionable Intelligence

A finding without context is noise. Every vulnerability Garrison detects comes with severity scoring, historical exploit context, and concrete remediation code — not just a line number.

Principle 04

Community Driven

The threat landscape evolves daily. We actively incorporate findings from Code4rena, Immunefi, and Solodit into our knowledge base, and welcome community contributions to detection patterns.

Principle 05

Developer Experience Matters

Security tools should be fast, clear, and integrate seamlessly into existing workflows. One command. Readable output. CI/CD ready. No configuration hell. If it's painful to use, it won't get used.

Principle 06

Democratize Security

A solo developer building a DeFi protocol deserves the same security analysis as a $100M protocol with a dedicated audit budget. Garrison is free, and that's intentional.

Under the Hood

The Technology Stack

Garrison is built on a carefully chosen stack of best-in-class open source tools, AI models, and custom-built analyzers.

Py
Python 3.9+
Core engine & CLI (3.10, 3.11, 3.12)
FA
FastAPI
REST API & web interface (Cloud App)
Sl
Slither
EVM static analysis
Ad
Aderyn
Rust-based static analysis
My
Mythril
Symbolic execution
Md
Medusa
Property-based fuzzing
Fo
Foundry
Test generation & PoC
D3
D3.js
Attack graph visualization
LLM
LLM Integration
AI Audit Copilot
RAG
RAG Engine
Knowledge retrieval
Gi
Git Integration
Time-travel scanner
SR
SARIF
CI/CD output format
Development History

Project Timeline

Q3 2024 — Origin
The Problem Becomes Personal
After the Euler Finance exploit and several near-misses on audited protocols, the decision is made to build a unified security platform that orchestrates all major analyzers in a single pipeline.
Q4 2024 — Foundation
Core Engine & Heuristic Scanner
The core Python engine is built. The Heuristic Scanner launches with 23 EVM heuristic rules. Slither and Aderyn are integrated as the first third-party analyzers.
Q1 2025 — Intelligence Layer
AI Copilot & RAG Knowledge Base
The AI Audit Copilot launches with RAG-based retrieval from Code4rena, Immunefi, and Solodit. 10,000+ historical audit findings are indexed. LLM integration provides natural language remediation guidance.
Q2 2025 — Visualization
Attack Path Visualizer & Cross-Chain Support
The D3.js attack graph engine launches, mapping multi-contract attack chains for the first time. Solana/Anchor support is added, making Garrison the only tool covering both EVM and Solana natively.
Q3 2025 — Automation
CI/CD Generator & Exploit PoC Engine
The CI/CD Pipeline Generator auto-creates GitHub Actions and GitLab CI configs. The Exploit PoC Generator begins producing working Foundry test cases for detected vulnerabilities — a first in the industry.
Q1 2026 — Production
v3.0.0 — PyPI Release Latest
638+ tests passing. 21 integrated analyzers. 4 output formats. Full EVM + Solana coverage. MIT licensed and open source. The platform that should have existed years ago is now available to everyone.
Q2–Q3 2026 — Roadmap
Cloud Platform & Enterprise Features
Web UI with team collaboration, scheduled scans, API access, and enterprise reporting. Waitlist open — join the list.
Intelligence Sources

Where Our Knowledge Comes From

The AI Copilot's RAG knowledge base is built from the most authoritative sources in smart contract security.

Code4rena

Thousands of audit contest findings, severity classifications, and judge decisions from the leading competitive audit platform.

Immunefi

Real-world bug bounty reports from the largest Web3 security platform, including post-mortems of critical vulnerabilities paid out at $1M+.

Solodit

Aggregated smart contract audit findings database with semantic search, enabling cross-reference of similar vulnerabilities across protocols.

Academic Research

Peer-reviewed papers on EVM security, formal verification, and smart contract vulnerability classification from IEEE, ACM, and arXiv.

Get Involved

Join the Security Community

Garrison is open source and community-driven. Contribute detection patterns, report bugs, or just use it on your next audit.

Contribute on GitHub Get in Touch