Tokenomics audits that name the actual problem
Independent multi-track review of an existing tokenomics design. Claims, market context, math, on-chain reality, mechanism integrity, inputs — every finding tied to a specific piece of evidence and ranked Critical, High, Medium, Low, or Note.
What we audit
Six review tracks running in parallel. Every finding tied to specific evidence — a quote from a whitepaper, a cell in a model, a transaction on-chain, a market reference with a date. No vague concerns, no design opinions dressed up as objective findings.
Claims and narrative
Every quantitative claim from whitepapers, decks, and public communications pulled, verified, and tagged. We separate marketing language from defensible commitments. Mismatches between stated mechanics and what the model or contracts actually implement surface here first.
Market context
TAM, SAM, SOM, competitor benchmarks, regulatory framing — verified against current data on DefiLlama, CoinGecko, Token Terminal, and on-chain registries. Stale references and fabricated comparisons get flagged with a source and a snapshot date.
Mathematics and formulas
Every calculation in the model recomputed independently. Formula correctness in xlsx, dimensional consistency, edge-case behaviour. Unit checks across the entire model — currency, time, supply, percentage. Off-by-one errors in vesting schedules surface every time.
On-chain reality
Claimed TVL, holder counts, transaction volumes, treasury holdings — verified against blockchain data. BlockchainQuery for L1/L2 state, DefiLlama for protocol-level metrics, explorer-level checks for specific addresses. Marketing numbers vs the actual on-chain state.
Mechanism integrity
How supply, demand, incentives, and treasury mechanisms interact. Feedback loops, sink-source balance, perverse incentives. Where the system breaks under stress — depeg scenarios, mass-exit events, oracle failures, governance attacks.
Inputs and sources
Every input parameter in the model: where did it come from, when was it captured, is it defensible? Magic numbers, stale data, and unsourced assumptions surface immediately. The model is only as solid as its weakest input.
How we work
From a discovery call to a delivered report in five steps. Every step ends with a written artefact you can challenge.
Discovery
What is being audited (full system, a specific mechanic, model only, public materials only), who needs the result, what decision hangs on it. End state: a written audit brief both sides agree on.
Parallel analysis
Four review tracks run simultaneously — claims, market context, math, on-chain. Mechanism integrity and inputs are reviewed across all four. Every track produces a finding log with evidence per item and a severity proposal.
Report and walk-through
Written report (PDF plus Markdown source), severity-ranked findings with evidence per item, recommended actions prioritised by impact and effort, plus a presentation call. The report is built so a CFO, a CPO, or an investor can defend it independently.
Material intake
Whitepaper, deck, model, on-chain identifiers, public communications — everything goes into a structured corpus, indexed by claim and by mechanic. Nothing reviewed informally.
Severity and synthesis
Findings ranked Critical, High, Medium, Low, Note. Cross-track issues elevated. The five to ten highest-impact items become the executive summary. Severity definitions are written into the report so nothing is hand-waved.
Have a model or deck to audit?
Send the docs. We will come back with a price, a timeline, and a recommended audit depth — full multi-track or focused single-track.
Sectors we audit
Real mechanics from our 240+ patterns library, weighted toward what is most often mis-specified, mis-modelled, or mis-implemented.
DeFi
GameFi
RWA
DePIN
L1/L2
Governance
Further reading on the audit angle
Three deep dives mapped to what we audit — parameters and inputs, mechanism integrity, governance design.
DeFi risk management — parameters, simulation, monitoring
How protocols catch bad parameters before they cascade — Gauntlet, Chaos Labs, VaR formulas, and the simulations behind continuous parameter tuning. The discipline behind the math and inputs tracks of an audit.
DeFi Hacks 2026 — a taxonomy of $765M in attacks
Most of 2026's expensive incidents now come from compromised operational infrastructure — keys, servers, verifiers, ops — not implementation. A taxonomy of attack vectors a mechanism-integrity review surfaces before launch.
Voting models in tokenomics
Token-weighted, quadratic, conviction, ve-model — quorum formulas, governance attacks, and the failure modes of voting theatre. The mechanism-integrity questions an audit asks before a treasury decision can be defended.
FAQ
When do you need a tokenomics audit?
How long does an audit take?
What deliverables ship?
How is a tokenomics audit different from a smart-contract security audit?
How is an audit different from modelling?
Can you audit tokenomics without an existing model?
Do you sign NDAs?
Need an independent set of eyes on your tokenomics?
Send what exists — model, deck, whitepaper, on-chain identifier, anything. We will read it cold and come back with a focused audit proposal.