Links

v2 Audits

While Radiant v2 is primarily composed of the same codebase as Radiant v1 — the Radiant DAO takes safety & security seriously and tripled down on audits.
Radiant conducted multiple top-to-bottom v2 audits with Peckshield and Zokyo with zero unresolved critical or high issues. BlockSec was also hired for whitehat hacking with zero unresolved issues.
BlockSec is dedicated to building blockchain security infrastructure. The team is founded by top-notch security researchers and experienced experts from academia and industry.
BlockSec has collaborated with MetaMask, Compound, Cronos, Forta, Tokenlon, KeyStone, Goplus, and more to secure the whole crypto ecosystem.
PeckShield was founded in 2018 by former Qihoo 360 Chief Scientist Xuxian Jiang, and major investors include Gaorong Capital. Team members are based in Hangzhou, Beijing, and San Francisco and consist of seasoned security professionals and senior researchers from world-leading security groups at companies such as Qihoo 360, Microsoft, Intel, Juniper, Alibaba, etc.
PeckShield has established strategic and long-term cooperations with key players in all areas of the blockchain ecosystem, such as blockchain infrastructure vendors, exchanges, crypto wallets, mining pools, DApp developers, and DeFi pioneers.
They have also attracted widespread attention from the industry since we have, among other things, discovered issues such as Ethereum smart contract BatchOverflow loophole, been included in the Etherscan.io recommended vendor list for smart contract security audit, and ranked Top 3 worldwide in the Ethereum Bounty Program.
Zokyo ("augment" in Japanese) provides blockchain security, design, and development talent to startups and enterprise organizations as needed. As a go-to web3 security, development, and investment partner working with some of the most progressive companies since 2019, they are highly experienced in tackling some of the most challenging problems with an entrepreneurial spirit.
With immediate access to in-demand skills ranging from security auditing, cryptography, white-hat hacking, mathematical specifications of network design, UI/UX design, QA, and full-stack engineering.