
Because security matters ...
We are a trusted security provider for Terra Network and projects building on Terra.


About us
What we do and who we are
At SCV, we are working to improve the security of the Terra ecosystem through open-source initiatives and researching while we engage directly with customers and protocols owners.
We contribute directly to Terra security posture and also help dapps and protocols to achieve the same.
SCV has more than 15 years of experience in the cyber security industry and have been involved in the hacker culture for much longer. We recruit the best talent we can find.

Services Offering
SCV offers the full range of offensive and defensive security services. Primarily executed in-house or through our trusted partners.
Advanced Penetration Testing
Ensure the underlying application and infrastructure are secure against vulnerabilities and threats.
Cloud Security Assessment
Review of cloud environments and their configuration against best security practices, to minimize the attack surface and mitigate unnecessary exposure.
Continuous Security
Any combination of our services, provided on a continual basis.
DevSecOps and Automation
Ensure that the CI/CD and other automation is configured securely, to best practices, and implement automated security testing within the pipeline.
Adversary Simulation (Red Team)
A highly targeted attack simulation designed to test all parties, providing the organisation or individuals with a realistic simulation to learn from, like "live fire" exercises. High value targets are identified pre-engagement and the Red Team engages using attacks crafted specifically for the engagement.
Security Code Review
Identifying security related weaknesses in source code, ideally before deployment or when active development is completed.
Social Engineering
We simulate an targeted attack to test the security awareness of an individual or a group of people. For example, Phishing techniques.
OSINT
Finding identifying information about the organisation and any team members. Particularly information that could be misused. Anonymity could be important, and OSINT tries to break anonymity by connecting all the dots.






