Skip to main content

What is VORO?

VORO is a security intelligence platform for smart contracts and autonomous agents. Six purpose-built services — scanning, Bayesian scoring, code intelligence, web delivery, fleet operations, and a mission control dashboard — work together to find vulnerabilities, score them with calibrated certainty, and deliver actionable threat reports.

No code leaves your environment. No cloud uploads. No vendor lock-in.

The Pipeline

source code


voro-scan ─── 647+ patterns, 16 languages, 14 external scanners
│ Tiered verification: symbolic proof → ensemble → Bayesian CI → LLM

▼ audit JSON

voro-guard ── Symbol extraction (8 languages), Solidity call graphs,
│ HMAC-SHA256 artifact signing, reachability analysis

▼ signed artifacts

voro-brain ── Bayesian scoring across 6 risk dimensions
│ 772 corpus-calibrated priors, Beta distributions, A-F grades
│ Dual-LLM isolation: untrusted code never reaches privileged scoring

▼ threat report JSON

voro-web ──── Web UI at scan.voro.security
│ GitHub App auto-scans PRs, 6-service Docker stack

▼ fleet telemetry

voro-core ─── Mission Control event ingestion, audited execution,
│ network-isolated runtime, SSE streaming

▼ operational data

voro-dash ─── Fleet dashboard: agent monitoring, cost tracking,
operator workflows, cohort lifecycle management

Six repositories. Zero cross-repo imports. JSON over CLI subprocess at every boundary. Use any piece standalone or run the full stack.

What VORO Does

Scans code across 16 languages

voro-scan runs 647+ vulnerability patterns and orchestrates 14 external scanners (Slither, Mythril, Echidna, Bandit, ESLint, Opengrep, and more). A 5-tier verification system filters findings from symbolic proof down to LLM-assisted triage, with 10% spot-checking to detect drift.

Covers 9 security taxonomies: SWC, CWE, OWASP Smart Contract, OWASP LLM, OWASP Agentic, Immunefi, DASP, MITRE ATLAS, and Code4rena.

Scores with calibrated certainty

voro-brain uses Beta distributions — not point estimates — to score every finding across 6 orthogonal risk dimensions:

DimensionWhat It Measures
fund_safetyReentrancy, flash loans, price manipulation
access_controlMissing ownership checks, privilege escalation
external_riskOracle manipulation, untrusted external calls
code_integrityInteger overflow, logic bugs, unchecked returns
dependency_healthVulnerable dependencies, outdated packages
agent_autonomyUnscoped permissions, prompt injection, autonomous execution

Every score carries confidence intervals derived from 772 pattern priors calibrated against 1,113 contracts with known ground truth. The scoring engine suppresses false positives and fuses signals from multiple scanners into a single confidence-weighted A-F safety grade.

Indexes code and verifies trust

voro-guard extracts symbols across 8 languages, builds Solidity call graphs with visibility metadata and reachability tracking, and signs every artifact with HMAC-SHA256. voro-brain consumes this via MCP to enrich exploitability assessments — if a vulnerable function is unreachable, its risk score reflects that.

Delivers results three ways

voro-web accepts scans via GitHub URL, Etherscan contract address, or direct file upload. A 6-service Docker stack (nginx, Next.js, Express, Python worker, Redis, Postgres) processes scans through BullMQ queues, and renders full threat reports with 6-dimension visualizations, finding cards, and confidence meters. The GitHub App posts findings directly to pull requests.

Runs fleet operations at scale

voro-core provides the operational backbone: audited command execution with time/memory limits, network-isolated runtimes, model proxy routing, and an HTTP event ingestion API for fleet-wide telemetry. voro-dash renders it all in a mission control dashboard with real-time SSE, cost rollups, cohort lifecycle management, and operator workflows with approval gates.

What Makes VORO Different

Local-first. Your code never leaves your machine. The full pipeline — scanning, scoring, report generation — runs locally. No cloud API required.

Agentic security. Detection patterns for MCP server trust boundaries, prompt injection vectors, tool permission scoping, and autonomous agent behavior. No other scanner covers agentic AI security as a first-class dimension.

Bayesian, not heuristic. Every score is a distribution with confidence bounds, not an arbitrary severity label. Priors are corpus-calibrated from labeled vulnerability datasets, not guesswork.

Trust-verified. HMAC-SHA256 artifact signing, dual-LLM isolation between untrusted code and privileged scoring, and fail-closed trust verification at every pipeline boundary.

16 languages, one tool. Solidity, Python, JavaScript, TypeScript, Go, Rust, Java, PHP, C#, C/C++, Ruby, Swift, Kotlin, Vyper, Motoko, and Anchor (Solana).

Current Accuracy

VORO publishes its precision and recall numbers. No major competitor does this.

MetricValueContext
Slither adapter precision0.746Post-calibration (was 0.247 before tuning)
SmartBugs recall0.972Across standard benchmark suite
Brain precision~0.52Recalibration in progress
DeFiHackLabs recall0.262Dataset mismatch being addressed

These are honest baselines. The benchmark whitepaper will document methodology and invite independent verification.

By the Numbers

MetricValue
Vulnerability patterns647+
External scanner integrations14
Languages supported16
Security taxonomies covered9
Bayesian scoring dimensions6
Calibration corpus1,113 contracts
Corpus-calibrated priors772
Ground truth benchmark labels807
Total tests across fleet4,400+
Repositories6