The worst day for your dApp looks like this:

TVL chart showing hack impact

How leading protocols are securing capital

“I use Foundry and Solidity every day. If I don't have to context switch, that's much better. I am thinking about invariants as I create the test suite, so it's easy to translate them to assertions.”
Thomas Smets CEO
“Current monitoring systems detect malicious patterns only after an action has been taken, and can only hope it's not an actual exploit but rather an action that could potentially lead to one. Catching a malicious transaction before it is mined would be the holy grail of monitoring.”
Dariusz Glowinski Head of Blockchain Engineering
$16M
Assets under protection
50+
Types of hacks covered
4 apps
Enforced by the block builder

How it works

Write Assertions
Network Enforcement
Manage With Ease
Fork Battle-Tested Rules
Allocate Wisely

¹Phylax states that:

We have not received any National Security Letters or FISA court orders. We have not been subject to any gag order by a FISA court. We have not received any warrants from any government organization. We have not placed any backdoors in our software. We have not received or complied with any government requests regarding our project. We have not altered our code or services at the request of any government agency.

If this statement is removed from future versions of this document, it is likely that Phylax has been served with a government subpoena and is unable to communicate this fact.

This statement will be updated on the 1st of every month.

Last updated: Feb 14 2026