
TrustSec was forged in the world's most demanding offensive security environments. This is the story of how a solo researcher became the trusted security partner for web3's most critical infrastructure.
Before blockchain, before smart contracts - Trust spent nearly a decade breaking the most hardened systems in traditional security. Military intelligence, IoT exploitation, and mobile zero-day research built the offensive instincts that would later define TrustSec's approach to web3.

Four years of offensive security research inside one of the world's most elite intelligence units, building a deep foundation in low-level systems exploitation.
Hacked Amazon's Ring doorbell on stage, achieved RCE on Comcast routers, and compromised smart locks - demonstrating that no device is safe from a determined researcher.
Discovered and weaponised dozens of iOS zero-day vulnerabilities, operating at the highest tier of mobile exploitation research.
In 2022, Trust entered web3 security - and the trajectory was immediate. Within months, a record-breaking contest run, six-figure bounties, and the formation of a handpicked team transformed a solo career into an institution.

Transitioned a decade of offensive security expertise into blockchain and smart contract security.
8 first-place finishes in 2 months - an unprecedented streak that announced Trust's arrival to the web3 security scene.
Chainlink $300K - discovered a vulnerability that could rig the random output of Chainlink VRF.
Won the largest Sherlock contest at the time ($720k), and by a wide margin.
The beginning of TrustSec as a team - Trust handpicked the first auditors to scale impact beyond solo work.
As TrustSec grew, so did the scale of its impact. From shaping industry standards to disclosing vulnerabilities that protected entire ecosystems, the team moved beyond individual protocols to influence the security posture of web3 itself.

Identified a denial-of-service vector affecting the entire ERC-20 permit ecosystem. 14 separate bounties received.
Helped establish the severity framework that the entire competitive audit ecosystem now follows.
Disclosed a critical account freeze vector affecting hundreds of protocols supporting Account Abstraction - one of the most impactful disclosures in Ethereum's recent history.
Throughout the years we've educated the community through blog series and posts on X. We've covered everything from hunting methodologies, to live war room stories, disclosures, and thought leadership on the state of web3 security.
We've maintained a persona of neutral authority respected by both leading white hats as well as tier-1 protocols and infrastructure. Our voice carries weight because it's earned - through consistent, honest, public work.
We intentionally choose to remain small, boutique, and tightly controlled. Trust handpicks the most talented hunters and supervises all audit and bounty campaigns. Every engagement receives the full weight of the team's attention - no assembly lines, no junior handoffs, no diluted quality.

We publish our findings, share our methodologies, and never hide behind NDAs when the community's safety is at stake.
Every report carries our name. We stand behind our work and take responsibility for the security posture of every protocol we clear.
We follow the evidence wherever it leads. Our loyalty is to the truth - not to the client's preferred narrative.
Every auditor on the team earned their seat through demonstrated skill. No politics, no nepotism - only results.

Get in touch to discuss your security needs. We'll match you with the right approach for your protocol.
Start a Conversation