Quickstart
Get from zero to protected in under 10 minutes.
Video Walkthrough
Watch our founder demonstrate how Guardrail works—from setup to catching real attacks:
How Guardrail Works
Connect your contracts — No code changes required. Just provide contract addresses.
Deploy guards — Choose from our blueprint library or work with our team on custom monitoring.
Get alerts — Slack, Discord, PagerDuty, Telegram, or webhooks. Sub-second delivery.
Respond — Manually investigate or trigger automated responses.
Why Audits Aren't Enough
The biggest DeFi hacks of 2024-2025—Cetus ($224M), Radiant ($50M), WazirX ($230M)—all happened on audited code. Audits verify code at a point in time. They can't catch:
Runtime attacks — Flash loans, price manipulation, reentrancy during execution
Governance exploits — Compromised multisigs, malicious proposals
Economic attacks — Oracle manipulation, MEV exploits
Upgrade vulnerabilities — Uninitialized proxies, storage collisions
Guardrail monitors what actually happens on-chain, in real-time.
Next Steps
For setup guides and configuration details, log in to access App Documentation →
Last updated

