Production-ready smart contract security platform — 21 integrated analyzers, configurable rules, and professional audit reports.
One command. Zero false positives. Client-ready deliverables.
pip install garrison-engineFor optional extras:
pip install "garrison-engine[web]" # Web interface
pip install "garrison-engine[pdf]" # PDF report export
pip install "garrison-engine[ai,advanced]" # RAG + LLM analysis
pip install "garrison-engine[web,pdf,ai,advanced]" # Full installSee QUICKSTART.md for Docker setup, optional external tools (Slither, Aderyn, Medusa), and full installation details.
# Scan a contracts directory and generate a report
garrison-engine --target ./contracts --report
# Use a pre-built execution profile
garrison-engine --target ./contracts --config garrison-pr.toml # fast PR check
garrison-engine --target ./contracts --config garrison-audit.toml # full audit
garrison-engine --target ./contracts --config garrison-bounty.toml # bug bounty- 21 Integrated Analyzers — Heuristic scanner, Slither, Aderyn, Mythril, Medusa, supply chain, threat intel, and more
- EVM + Solana — 34 EVM vulnerability patterns, 35 Solana/Anchor rules, IDL validation
- 3 Execution Profiles — PR check (< 2 min), full audit, bug bounty mode
- Professional Reports — HTML, Markdown, JSON, SARIF, PDF with risk scoring
- CI/CD Native — GitHub Actions, GitLab CI, Azure DevOps, Jenkins pipeline generator
- AI Audit Copilot — RAG + LLM enrichment with local (Ollama) or cloud (OpenAI) backends
- Time-Travel Scanner — Git history analysis to track vulnerability introduction
- Attack Graph Visualization — Interactive D3.js cross-contract attack path graphs
- Exploit PoC Generator — Foundry test exploits from detected findings
- Protocol Fingerprinting — Identifies forks of known protocols and inherited CVEs
- Offline / Air-Gapped — Bundled threat intel DB, local embeddings, Ollama LLM
Garrison Engine is built for environments where source-code confidentiality is non-negotiable — bank compliance teams, Web3 audit firms, and air-gapped infrastructure.
- Zero code exfiltration — No source code, bytecode, or contract artifacts ever leave the host machine during a scan. All analysis is performed locally.
- Local-first AI inference — The AI Copilot defaults to local inference via Ollama when configured (
garrison.toml → [ai] provider = "ollama"). If OpenAI is selected, only a one-paragraph natural-language summary of each finding is sent to the OpenAI API — never raw source code. - Bundled threat intelligence — Vulnerability databases and protocol signatures ship with the package and are queried locally. Network access only occurs if you explicitly run
garrison --update-signatures. For fully air-gapped environments, usegarrison --update-from-file <path>to import pre-downloaded signature packs. - No telemetry — The CLI contains zero usage telemetry, analytics callbacks, tracking pixels, or phone-home behavior. Period.
| Feature | Community (Free) | Developer ($49/mo) | Professional ($149/mo) | Team ($399/mo) |
|---|---|---|---|---|
| Heuristic scanning + CLI | ✅ | ✅ | ✅ | ✅ |
| Markdown / JSON reports | ✅ | ✅ | ✅ | ✅ |
| HTML / SARIF / PDF reports | — | ✅ | ✅ | ✅ |
| Slither + Solana analyzer | — | ✅ | ✅ | ✅ |
| AI Copilot + Exploit Gen | — | — | ✅ | ✅ |
| Time-travel + Attack graph | — | — | ✅ | ✅ |
| Machine activations | — | 1 | 3 | 10 |
Get your license: https://garrisonsec.com/pricing
export GARRISON_PRO_LICENSE=your-key-here
garrison-engine --target ./contracts --report --format html| Document | Description |
|---|---|
| QUICKSTART.md | Full install, config reference, CI/CD, offline setup, troubleshooting |
| docs/CONFIGURATION.md | Complete garrison.toml reference |
| docs/CLI_REFERENCE.md | All CLI flags and examples |
| docs/WEB_APP_GUIDE.md | Self-hosted web interface |
| docs/DEPLOYMENT.md | Production server setup |
| CONTRIBUTING.md | Adding rules and integrations |
- Community features: MIT License — see LICENSE
- Pro features: Commercial License — see LICENSE-PRO
Built by CyberShield Austin · @defiauditccie · garrisonsec.com
Powered by Slither · Aderyn · Medusa · Mythril · Foundry · OSV.dev
Threat intelligence: Code4rena · Immunefi · Solodit · Neodyme · OtterSec · Sec3
Version: 4.4.0 | Chains: EVM + Solana | Analyzers: 21 | Patterns: 34 EVM + 35 Solana
⭐ If this helped you find bugs, please star the repo!