Multi-Runtime Architecture
One tool for EVM and Solana, with genuine per-runtime analysis rather than a generic pass. EVM contracts go through Solidity/Yul recovery; Solana programs through Rust-level reconstruction.
Drop a contract address — EVM or Solana — and Sigvex handles the rest. Bytecode becomes readable source code in seconds, with automated vulnerability detection running across the full decompilation pipeline. No source code, no ABI, no setup.
Sigvex doesn't just decode opcodes — it recovers intent. Each bytecode sequence is analyzed for structure, types, and control flow before security checks run. The decompiler knows the difference between a proxy delegation and an arbitrary delegatecall.
One tool for EVM and Solana, with genuine per-runtime analysis rather than a generic pass. EVM contracts go through Solidity/Yul recovery; Solana programs through Rust-level reconstruction.
Full semantic understanding across runtimes. For EVM: reconstructs msg.sender, msg.value, block.timestamp. For Solana: account ownership, PDAs, and CPI.
EVM: Post-Dencun opcodes (BLOBHASH, MCOPY, TLOAD/TSTORE). Solana: SVM v1.18+ instructions. Updated within 24 hours of protocol upgrades.
Recognizes compiler-optimized bytecode patterns and reconstructs their original intent — array indexing, struct offsets, bit-packing operations. Over 40 patterns across Solidity and Yul output.
Extensive database with 50,247 signatures updated daily for automatic function selector resolution. Identifies standard interfaces and well-known contract patterns.
Written in Rust for correctness and speed. The analysis core uses a work-stealing scheduler for parallel processing, advanced graph algorithms for control flow reconstruction, and exhaustive pattern matching for semantic recovery. Roughly 3x faster than Python-based tools.
Four steps from raw bytecode to a security report. Works directly from an address — no source code, no ABI, no compilation artifacts.
Enter any contract or program address across EVM, Solana, or other supported runtimes. Automatically detects proxies and fetches implementation bytecode.
Universal three-tier IR pipeline (LIR → MIR → HIR) transforms bytecode into higher-level languages with runtime-specific type inference and semantic analysis.
Automated vulnerability detectors run across the decompiled output. Optional fuzzing mode generates concrete inputs to validate findings against live contracts.
Vulnerability findings with severity ratings, code locations, and remediation guidance.
Free tier — 500 credits included, no credit card required
Detection, studio, and fuzzing — each designed to work with the others, not alongside them.
Runs automatically on every analysis — no configuration, no rules to write.
Maps control flow, infers storage layout, and identifies proxy patterns from bytecode alone.
Interactive tooling for hands-on investigation: decompile, trace, fuzz, and validate in one session.
Analyze zero-knowledge proof circuits for under-constrained signals and witness vulnerabilities.
Continuous on-chain monitoring with SSE-powered alerts for deployed contracts.
Key differences compared to widely-used tools in the space
| Feature | Sigvex | Slither | Dedaub |
|---|---|---|---|
| Multi-Runtime Support | ✓ EVM & SVM | ✗ EVM only | ✗ EVM only |
| Decompilation | ✓ Solidity & Yul | ✗ | ✓ EVM only |
| Analysis Speed | <2s | ~5s | ~10s |
| Detector Count | 250+ | 90+ | ~30+ |
| Open Source | ✗ | ✓ | ✗ |
| Free Tier | ✓ 500 CU gift | ✓ | ✓ |
| Credit-Based Pricing | ✓ | ✗ Free/OSS | ✗ Subscription |
| API Access | ✓ | ✗ | ✓ |
| Browser-Based | ✓ | ✗ | ✓ |
Note: Comparison based on publicly available information as of early 2026. Slither operates on source code; Sigvex works directly from bytecode.
Start with 500 free compute units (CU). Top up when you need to, or upgrade to Pro for a monthly allocation.
Try the decompiler and run your first security scan
Full analysis pipeline with studio access and API integration
Custom deployment with dedicated support and extended analysis modes