# Quickstart

Get from zero to protected in under 10 minutes.

## Video Walkthrough

Watch our founder demonstrate how Guardrail works—from setup to catching real attacks:

{% embed url="<https://www.loom.com/share/dfc64444602744aeb5699003810cf472>" %}

## How Guardrail Works

* **Connect your contracts** — No code changes required. Just provide contract addresses.
* **Deploy guards** — Choose from our blueprint library or work with our team on custom monitoring.
* **Get alerts** — Slack, Discord, PagerDuty, Telegram, or webhooks. Sub-second delivery.
* **Respond** — Manually investigate or trigger automated responses.

## Why Audits Aren't Enough

The biggest DeFi hacks of 2024-2025—Cetus ($224M), Radiant ($50M), WazirX ($230M)—all happened on audited code. Audits verify code at a point in time. They can't catch:

* **Runtime attacks** — Flash loans, price manipulation, reentrancy during execution
* **Governance exploits** — Compromised multisigs, malicious proposals
* **Economic attacks** — Oracle manipulation, MEV exploits
* **Upgrade vulnerabilities** — Uninitialized proxies, storage collisions

Guardrail monitors what actually happens on-chain, in real-time.

## Next Steps

* [Explore Use Cases →](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/use-cases/README.md)
* [View Guard Catalog →](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/guards/README.md)
* [See Case Studies →](https://github.com/CryptoGuardrail/docs-v3-external/blob/main/case-studies/README.md)

For setup guides and configuration details, log in to access [App Documentation →](https://docs.guardrail.ai/app/)

***
