How TestMachine Works
Dynamic code execution + reinforcement learning = zero false positives. We don't guess at vulnerabilities. We prove them.
End-to-end security analysis
From code ingestion to verified proof-of-concept. Every stage automated. Every finding proven.
LLMs as the intelligence layer
At TestMachine, LLMs aren't used to detect vulnerabilities — they act as the context engine that makes everything else work.
Attack Surface Identification
They identify what to test: structural risks, economic invariants that must hold, access control patterns that could be bypassed, and governance flows that could be manipulated.
Economic Flow Mapping
LLMs trace how value moves through the protocol: token minting, staking rewards, liquidation mechanics, and fee structures. They build the economic model that the RL agents attack.
Why This Matters
LLMs are brilliant at understanding code structure, documentation, and intent. But they're fallible — they hallucinate, produce false positives, and they can't execute code. By using LLMs for what they're good at — understanding — and RL agents for what they're good at — exploration and exploitation — TestMachine eliminates the false positive problem entirely.
RL agents attack your protocol
Lodestar, our RL engine, deploys agents that probe DeFi protocols. They explore every entry point, discover attack paths, and prove exploits by executing them.
The infrastructure moat
This isn't something you can replicate with a prompt. TestMachine's engine requires dedicated infrastructure that runs at scale, continuously.
Forked Environments
Full blockchain fork per protocol analysis. Real state, real balances, real contract code.
Zero False Positives
RL agents don't just find vulnerabilities — they exploit them on forked chains. Every finding is verified with a working proof-of-concept.
Continuous Re-testing
Contracts are re-analyzed as they upgrade. Markets shift, new functions appear — the engine adapts.
All EVM Chains
Ethereum, Base, Arbitrum, Optimism, Polygon, Avalanche, BSC. One engine, full coverage.
Powered by the engine
Token Custody
Risk scoring for 9M+ tokens across all EVM chains. Every token analyzed for confiscation, hidden minting, proxy manipulation, and more. Risk probability from 0 (safe) to 100 (critical).
Azimuth
AI agents that actively attack your smart contracts in forked mainnet environments with real transaction execution. Zero false positives — if Azimuth reports a vulnerability, it was actually exploited. Results in minutes, not weeks.
See it in action
Point TestMachine at your protocol. Get confirmed vulnerabilities with proof-of-concept exploits. Zero false positives.
Launch App