Skip to main content
Sigvex
EVM & Solana bytecode analysis platform

Decompile. Detect. Validate.

Drop a contract address — EVM or Solana — and Sigvex handles the rest. Bytecode becomes readable source code in seconds, with automated vulnerability detection running across the full decompilation pipeline. No source code, no ABI, no setup.

Bytecode decompilation
Vulnerability detection
Exploit validation
Supported Runtimes:
EVM
Solana
Move
WASM

Beyond Simple Disassembly

Sigvex doesn't just decode opcodes — it recovers intent. Each bytecode sequence is analyzed for structure, types, and control flow before security checks run. The decompiler knows the difference between a proxy delegation and an arbitrary delegatecall.

2 Runtimes

Multi-Runtime Architecture

One tool for EVM and Solana, with genuine per-runtime analysis rather than a generic pass. EVM contracts go through Solidity/Yul recovery; Solana programs through Rust-level reconstruction.

99.8% Accuracy

Semantic-Aware Lifting

Full semantic understanding across runtimes. For EVM: reconstructs msg.sender, msg.value, block.timestamp. For Solana: account ownership, PDAs, and CPI.

24h Updates

Latest Runtime Support

EVM: Post-Dencun opcodes (BLOBHASH, MCOPY, TLOAD/TSTORE). Solana: SVM v1.18+ instructions. Updated within 24 hours of protocol upgrades.

40+ Patterns

Inverse Optimization Engine

Recognizes compiler-optimized bytecode patterns and reconstructs their original intent — array indexing, struct offsets, bit-packing operations. Over 40 patterns across Solidity and Yul output.

50.2K Sigs

50,000+ Function Signatures

Extensive database with 50,247 signatures updated daily for automatic function selector resolution. Identifies standard interfaces and well-known contract patterns.

3x Faster

Built with Rust

Written in Rust for correctness and speed. The analysis core uses a work-stealing scheduler for parallel processing, advanced graph algorithms for control flow reconstruction, and exhaustive pattern matching for semantic recovery. Roughly 3x faster than Python-based tools.

From Bytecode to Higher-Level Languages

Four steps from raw bytecode to a security report. Works directly from an address — no source code, no ABI, no compilation artifacts.

01

Fetch Bytecode

Enter any contract or program address across EVM, Solana, or other supported runtimes. Automatically detects proxies and fetches implementation bytecode.

02

Progressive Decompilation

Universal three-tier IR pipeline (LIR → MIR → HIR) transforms bytecode into higher-level languages with runtime-specific type inference and semantic analysis.

03

Security Analysis

Automated vulnerability detectors run across the decompiled output. Optional fuzzing mode generates concrete inputs to validate findings against live contracts.

04

Actionable Report

Vulnerability findings with severity ratings, code locations, and remediation guidance.

Get Started Free

Free tier — 500 credits included, no credit card required

Three Tools, One Pipeline

Detection, studio, and fuzzing — each designed to work with the others, not alongside them.

Vulnerability Detectors

Runs automatically on every analysis — no configuration, no rules to write.

  • Reentrancy detection
  • Access control violations
  • Integer overflow/underflow
  • Unchecked return values
  • Delegatecall to untrusted
  • Unprotected self-destruct
  • Storage collisions
  • Gas optimization issues

Bytecode Analysis

Maps control flow, infers storage layout, and identifies proxy patterns from bytecode alone.

  • Control flow graph generation
  • Data flow analysis
  • Function signature detection
  • Storage layout inference
  • Proxy pattern detection
  • Standard interface detection
  • Cross-contract call analysis
  • Gas profiling

EVM & SVM Studio

Interactive tooling for hands-on investigation: decompile, trace, fuzz, and validate in one session.

  • Interactive decompiler
  • HIR explorer
  • Execution trace viewer
  • Storage inspector
  • Event log decoder
  • Exploit scenario builder
  • Fuzzing framework
  • Validation suite

ZK Circuit Security

Analyze zero-knowledge proof circuits for under-constrained signals and witness vulnerabilities.

  • Circom circuit parsing
  • Under-constrained signal detection
  • Nondeterministic witness detection
  • Unused public input detection
  • Assignment type analysis
  • Multi-template support

Real-Time Monitoring

Continuous on-chain monitoring with SSE-powered alerts for deployed contracts.

  • Transaction stream monitoring
  • Proxy upgrade detection
  • Flash loan detection
  • MEV pattern matching
  • Value transfer alerts
  • SSE real-time alert feed

How Sigvex Compares

Key differences compared to widely-used tools in the space

Feature
Sigvex
Slither
Dedaub
Multi-Runtime Support
EVM & SVM
EVM only
EVM only
Decompilation
Solidity & Yul
EVM only
Analysis Speed
<2s
~5s
~10s
Detector Count
250+
90+
~30+
Open Source
Free Tier
500 CU gift
Credit-Based Pricing
Free/OSS
Subscription
API Access
Browser-Based

Note: Comparison based on publicly available information as of early 2026. Slither operates on source code; Sigvex works directly from bytecode.

Simple, Transparent Pricing

Start with 500 free compute units (CU). Top up when you need to, or upgrade to Pro for a monthly allocation.

Free

$0 / forever

Try the decompiler and run your first security scan

  • 500 credits welcome gift
  • 1 analysis per month
  • Fast mode (pattern matching)
  • Basic decompilation output
  • All supported chains
  • Community support
Start Free

Pro

$49 /month

Full analysis pipeline with studio access and API integration

  • 1,000 CU included per month
  • Buy additional credits anytime
  • Standard + Deep analysis modes
  • EVM Studio & SVM Studio access
  • 250+ vulnerability detectors
  • API access (10K calls/mo)
  • Priority support
Start Pro Trial

Enterprise

Custom

Custom deployment with dedicated support and extended analysis modes

  • Everything in Pro
  • Custom CU allocation
  • Exhaustive + Discovery modes
  • Custom detector rules
  • Coverage-guided fuzzing
  • Dedicated or self-hosted instance
  • SLA guarantee
  • Dedicated security support
Contact Sales