Securing the
Decentralized Future

Professional web3 security audit firm. Solidity, Rust, Go protocols.

Proven Results

Competitive audit results from leading Web3 security platforms

Panoptic Protocol Audit - #1 on Code4rena
Code4rena #1 - Panoptic
SukukFi Audit - #3 on Code4rena
Code4rena #3 - SukukFi
Monolith Stablecoin Factory Audit - #3 on Sherlock
Sherlock #3 - Monolith

Built by Researchers,
for Builders

Valves Security is a specialized Web3 security team founded by Veselin and Valeri. With deep experience across EVM-based protocols, Cosmos (Go) chains, and Rust systems, we help projects identify and eliminate critical vulnerabilities before they reach mainnet.

Our mission is to raise the security baseline of the Web3 ecosystem through careful manual code review and on client request top-tier model AI tools.

Battle-Tested

Competed on Sherlock and Code4rena, ranking in the top 3 across multiple audit competitions with over 1500 participating researchers.

Multi-Chain Expertise

Specialized in Solidity, Rust, and Go. Covering EVM protocols, Cosmos chains, and Rust systems.

Transparent Process

Every finding is documented with a proof-of-concept, severity rating, and clear, remediation steps.

The Team

The duo that made Valves possible

vesko210 - Security Researcher
Vesko210
Security Researcher

Veselin is a smart contract security researcher with a solid Web2 foundation. What started as a suggestion from his cousin quickly turned into a deep passion for vulnerability research. Ratio bugs don't get past him, and he thrives on auditing non-standard, innovative protocol designs.

Merulez99 - Security Researcher
Merulez99
Security Researcher

Valeri specializes in adversarial analysis of EVM based DeFi protocols, including lending, vault, and stablecoin systems. He focuses on vulnerabilities in share accounting, debt models, and cross-contract execution logic, targeting invariant violations, rounding exploits, and edge-case solvency failures.

100+
Vulnerabilities Discovered
50K+
Lines of Code Audited
0
Post-Audit Exploits

Ready to Secure Your Protocol?

Get in touch and we’ll respond within 12 hours with a indicative price and timeline estimate.