Who We Are ?
We are a group of exceptionally skilled smart contract security researchers, well positioned on the leaderboards of several platforms, such as Immunefi, Code4rena, Sherlock, and CodeHawks. The team is led by highly experienced and mature individuals with a solid background in both traditional and modern decentralised finance (Defi). Our goal is to provide value to the protocols we work with. We view them as our alliance and business partners; the terms “customer” and “client” don’t exist in our books. What adds value to you, we also find valuable.
Our Services
Smart Contract
Security Review
Smart Contract Security Review
We analyze your codebase line by line and identify each and every technical/logical flaw. We work hard to make your codebase highly gas optimised by going deep into opcode by opcode analysis.
Sentinels
Sentinels
Real-time operational security monitoring
Consultancy
Consultancy
We can collaborate with the team of developers in predevelopment and development stages to help them develop more secure and highly gas optimized code.
Business Partners

Audit Process Flow
We ensure thorough and customized assessments for each project. This meticulous approach allows for the early identification and mitigation of potential vulnerabilities, fostering client trust and collaboration. By combining automated precision with manual scrutiny, Block Sentinels delivers higher accuracy, actionable insights, and tailored solutions, setting the firm apart from competitors and positioning it as a trusted partner in the blockchain security landscape.
Source Code Procurement
Pre Audit Client Consultation
Automated Tests Analysis
Manual Analysis of Smart Contracts
Initial Audit Report
Mid Audit Client Consultation
Mitigation
Final Audit Report
Source Code Procurement
Pre Audit Client Consultation
Automated Tests Analysis
Manual Analysis of Smart Contracts
Initial Audit Report
Mid Audit Client Consultation
Mitigation
Final Audit Report
On 28th August 4:29 UTC, an Aave's periphery smart contract (not part of Aave core) was exploited and ParaSwapRepayAdapter was robbed.