Page cover

keyQuickstart

Get from zero to protected in under 10 minutes.

Video Walkthrough

Watch our founder demonstrate how Guardrail works—from setup to catching real attacks:

How Guardrail Works

  • Connect your contracts — No code changes required. Just provide contract addresses.

  • Deploy guards — Choose from our blueprint library or work with our team on custom monitoring.

  • Get alerts — Slack, Discord, PagerDuty, Telegram, or webhooks. Sub-second delivery.

  • Respond — Manually investigate or trigger automated responses.

Why Audits Aren't Enough

The biggest DeFi hacks of 2024-2025—Cetus ($224M), Radiant ($50M), WazirX ($230M)—all happened on audited code. Audits verify code at a point in time. They can't catch:

  • Runtime attacks — Flash loans, price manipulation, reentrancy during execution

  • Governance exploits — Compromised multisigs, malicious proposals

  • Economic attacks — Oracle manipulation, MEV exploits

  • Upgrade vulnerabilities — Uninitialized proxies, storage collisions

Guardrail monitors what actually happens on-chain, in real-time.

Next Steps

For setup guides and configuration details, log in to access App Documentation →arrow-up-right


Last updated