$340M
TVL operated
Lending markets
Collateral management, interest-rate models, liquidation engines, oracle integration. Risk parameters calibrated against historical stress, with explicit caps and circuit breakers.
Blockchain & Web3 · MESH
AMMs, lending markets, yield strategies, perpetuals, and treasury tooling — engineered with risk-parameter discipline, oracle design that survives stress, and the operational rigor that turns a protocol into a system institutions can hold against their own mandates.
The problem
Post-mortems across DeFi exploits and depeggings consistently surface non-contract failure modes: oracle prices manipulated under low liquidity; risk parameters set during a calm market that broke under volatility; governance designs that looked decentralized but routed through one multisig; emergency pauses that didn't pause what mattered. The smart contracts in most cases worked exactly as written — the architecture around them didn't.
We engineer DeFi protocols against those failure modes. Oracle design that handles extreme conditions, risk parameters calibrated against historical stress, governance and admin patterns that don't centralize through omission, and operating discipline (monitoring, on-call, runbook) that survives a hostile night. Architecture decisions documented in writing, audits scoped to the right code at the right phase, and the institutional-grade discipline regulated markets require.
Where it ships
Specific applications we’ve built and operated. Not speculative — every example below is grounded in a real shipped engagement.
$340M
TVL operated
Collateral management, interest-rate models, liquidation engines, oracle integration. Risk parameters calibrated against historical stress, with explicit caps and circuit breakers.
Constant-product, constant-sum, stable-swap, and concentrated-liquidity pools. Hooks / plugins for fee customization, MEV-aware design, and gas-efficient routing.
Vault architectures, strategy contracts with explicit risk envelopes, withdrawal queues, and the operational tooling treasury teams actually need.
Funding-rate design, liquidation engines, insurance fund mechanics, and the off-chain order-book / matching engine where the workload demands one.
Multisig + timelock governance, snapshot integration, on-chain treasury management, and operational tooling for proposal lifecycle and treasury reporting.
How we engage
Each phase has a deliverable, an owner, and an acceptance criterion. Not slogans — operating rules.
Discovery starts with stress scenarios: liquidity crunches, oracle manipulation, governance attacks. Risk parameters calibrated against historical stress, not against optimistic backtests. Trust assumptions and admin patterns documented up front.
Foundry-based development with property-based fuzzing, invariant testing, differential harnesses against reference implementations. Static analysis (Slither, Mythril) in CI. Tests model the failure modes the post-mortem corpus has documented.
Multiple external audits before mainnet for protocols with material TVL. Formal verification of critical invariants (Certora, Halmos) for the properties whose violation would be catastrophic. Audit reports shipped alongside the contract.
Monitoring on critical invariants, on-call rotation, incident-response runbook, and a pause-and-upgrade plan. Most engagements continue under Managed Services for ongoing parameter tuning, oracle monitoring, and quarterly architectural review.
Capabilities
Stack
Selected work
Common questions
Design first. Multiple price sources where possible, on-chain TWAPs for manipulation resistance, time-windowed price freshness checks, and explicit fallback behavior when price feeds break. We model stress scenarios (low-liquidity manipulation, oracle outages) and design the protocol to fail safely rather than dramatically.
Designed into the architecture, not patched after launch. Commit-reveal patterns, batched matching, MEV-Share / MEV-Blocker / Flashbots Protect integration, and protocol-owned sequencing where the threat model warrants it. We tell you when a workload is fundamentally MEV-exposed and the right answer is a different architecture or chain.
Against historical stress. We backtest against the worst observed market conditions (March 2020, May 2021 LUNA, June 2022 Celsius / 3AC, March 2023 USDC depeg, plus chain-specific events) and design parameters with explicit safety margins. We model the parameter set and present sensitivity analysis to your risk committee — not a single point estimate.
Yes — most modern DeFi protocols ship multi-chain. We design with chain-portable architecture (consistent precision, gas-aware design, deterministic deployment artifacts) and explicit per-chain parameter sets. We tell you when going multi-chain adds attack surface that the workload doesn't justify.
Yes — KYC-gated transfers under ERC-3643, sanctioned-address screening, jurisdictional access controls, and the audit-trail tooling regulators expect. We've shipped compliant token issuance and KYC-gated DeFi for institutional clients. The compliance frame is part of the protocol architecture, not an after-launch wrapper.
Architecture and parameter design: 6–10 weeks, $100K–$300K. Production protocol development with audits: 6–14 months, $800K–$3M depending on complexity and TVL target. Multi-product DeFi platforms: $2M–$6M+. External audit fees pass through (typically $150K–$500K per audit). Managed Services for ongoing operations: $50K–$200K monthly retainer. Brackets published honestly so visitors self-qualify before the first call.
Within Blockchain & Web3
Talk to us
A senior engineer plus the MESH department lead joins the first call. No discovery gauntlet, no junior reps.