Hexens - September 2025 Security Council

About Hexens

At Hexens (founded 2022), we provide world-class security assessment services and build the most effective security tooling to protect the future of Web3. We have completed more than 250 audits across chains such as Ethereum, Solana, Arbitrum, Avalanche, Polygon, BNB Chain, Filecoin and more; securing code that safeguards more than $120b in on-chain value for clients, including EigenLayer, Lido, 1inch, LayerZero, PancakeSwap, Ava Labs and others. Hexens services include but are not limited to; smart contract audits, cryptography audits, penetration testing, and full scale red-teaming.

Why Hexens

We are an approved name on the Arbitrum Audit Program, as well as whitelisted on marketplaces for; Base, Scroll, and Solana.

You can find our public audit reports here; https://github.com/Hexens/Smart-Contract-Review-Public-Reports

Beyond audits, our bug bounty R.xyz is home to projects such as Scroll, 1inch, Pancakeswap and Polygon, and our tool Glider [glide.r.xyz] is like the “X-ray” for code analysis and the only blockchain-scale security, risk, compliance, data analysis platform.

The auditors at Hexens are known globally, notably with our Head of Audits Kasper and Lead Auditor Soon sitting at the top of the leaderboards of the biggest bug bounty platforms. Besides that, we have achieved in Web3 competitions:

  • Paradigm CTF 2022, 2nd Place

  • Paradigm CTF 2023, 6th Place

  • ETH Escape Bangkok 2024, 1st Place

In addition to competing in CTFs, our deep-rooted passion for competitive hacking led us to launch RCTF (ctf.r.xyz) - a Web3-focused CTF that quickly became the largest in the space by many metrics. Designed around real-world exploitation scenarios, it attracted top talent across the globe and set a new standard for security challenges in Web3. We are making it an annual event.

Our Representative; Vahe Karapteyan (Co-Founder & CTO):
Vahe’s journey in cybersecurity started at 12yo, when he learned C++ and started developing kernel drivers, anti-rootkits, VM and Hypervisor security modules while still going to school.

During university studies he worked as an offensive security engineer and reverse engineer also uncovering 0-day vulnerabilities on various vendors.

Highlights & Achievements:

  • Winner of over 20 international cybersecurity competitions (CTFs), both solo and with the world-renowned team, MSLC.

  • Pioneered security reviews for innovative technologies, including zero-knowledge proofs.

  • Designed and currently developing the only scalable vulnerability and data research tool for smart contracts.

  • Fun fact: Proved a theorem in lambda calculus for his master’s thesis— ask me about it if we ever meet!

Primary Expertise:

  • VM and low-level components security

  • EVM and Blockchain internals

  • Zero-Knowledge audit

  • Reverse Engineering and Vulnerability Research

Website: hexens.io
X: @hexensio / @k3mmio

You can find some further information on our Tally page here:

We appreciate the opportunity to become apart of the Arbitrum Security Council. Please feel free to reach out if you have any questions!

Just to clarify for delegates: while Hexens’ co-founders have previously been part of SEAL 911, they are not currently listed as active members of the team.

I’m sharing this only to ensure the community has the most accurate information. As someone who has also rotated out of SEAL 911 during its recent consolidation, I want to emphasize that this in no way reflects on Hexens’ expertise or capabilities. They maintain a strong track record and continue to be recognized for their contributions to security across the ecosystem.

Thank you Michael for pointing this out. The text posted was taken from something previously used by Hexens prior to the consolidation of SEAL911. The submission has now been updated.

1 Like