Plans & Pricing
Get results within hours, or get a dedicated forward-deployed engineer for continuous coverage and real-time support.
See our benchmarksSWARM Basic
Agentic security scan for a single codebase or application.
Best for
Smaller projects, single smart contracts, or lightweight web applications with straightforward logic.
- Full agentic penetration test
- All supported languages and frameworks
- Detailed PDF report with findings
- Severity-rated vulnerabilities
- Proof-of-concept exploits
- Remediation guidance
- Compliance-ready documentation
SWARM Pro
Deeper coverage for complex applications with multiple modules and integrations.
Best for
Multi-contract protocols, full-stack dApps, or applications with complex business logic, role-based access, and cross-module interactions.
- Everything in Basic
- Extended attack surface analysis
- Cross-module and integration testing
- Business logic vulnerability testing
- Multi-chain and cross-chain analysis
- Priority support and faster turnaround
- Re-test after remediation included
Custom
Continuous coverage with optional forward-deployed engineer embedded in your team.
Best for
Organizations that need ongoing security, dedicated human expertise on top of SWARM's AI agents, or have unique requirements that go beyond a standard engagement.
- Everything in Pro
- Forward-deployed FailSafe engineer
- Continuous testing and monitoring
- Real-time triage and remediation support
- Custom scoping and methodology
- Dedicated Slack/comms channel
- SLA-backed response times
Included in Every Plan
All plans are powered by SWARM's agentic testing engine with full language coverage.
Threat Model Report
Every engagement starts with a detailed threat model mapping your architecture, trust boundaries, attack surfaces, and adversary profiles. This report drives the entire audit and is delivered alongside your findings.
Compliance-Ready Report
PDF report formatted for SOC 2, ISO 27001, HIPAA, and 40+ compliance frameworks.
All Languages Supported
Solidity, Rust, CosmWasm, TypeScript, Python, Go, and every major language.
Proof-of-Concept Exploits
Every finding includes a working PoC so your team can reproduce and verify.
Remediation Guidance
Actionable fix recommendations with code-level suggestions for each finding.
100% Reproducible Runs
Every scan is deterministic and fully reproducible. Re-run any engagement to verify fixes or compare results over time.
Language Coverage
SWARM's agents understand the security semantics of each language and framework.

SWARM Tops Security Benchmarks
SWARM's multi-agent architecture detected 83 out of 120 vulnerabilities on EVMBench, achieving 69.2% recall. That's 48% more findings than the next best platform.
Our deep threat modeling approach also uncovers bugs outside of EVMBench's scope. All runs are 100% reproducible and our evaluation harness is fully open-source.
Frequently Asked Questions
SWARM covers all major languages used in smart contract and web development: Solidity, Rust, CosmWasm, Move, Cairo, TypeScript, JavaScript, Python, Go, Java, C/C++, and more. If your stack includes it, SWARM can test it.
SWARM deploys AI-powered security agents that autonomously explore your codebase, identify attack surfaces, and attempt exploitation. Unlike traditional scanners, these agents reason about business logic, chain vulnerabilities together, and adapt their strategy based on what they find.
Basic and Pro reports are typically delivered within 3 to 5 business days. Custom engagements with a forward-deployed engineer are scoped on a per-project basis.
On the Custom plan, a FailSafe security engineer embeds directly with your team. They work alongside SWARM's AI agents to provide hands-on guidance, triage findings in real time, and help your developers remediate issues on the spot.
Yes. You can start with Basic or Pro and upgrade at any time. If you need ongoing coverage or a dedicated engineer, we will work with you to transition to a Custom engagement.
All plans include a detailed PDF report suitable for SOC 2, ISO 27001, and other compliance frameworks. The report covers methodology, findings with severity ratings, proof-of-concept exploits, and remediation guidance.
Ready to Secure Your Code?
Get started with SWARM today. Choose a plan or talk to our team about a custom engagement.