Share this article

EY Launches Token and Smart Contract Testing Service in Open Beta

Now in public beta, EY's new review service assesses code quality and checks for malware.

Updated Sep 13, 2021, 11:50 a.m. Published Dec 18, 2019, 1:38 p.m.
EY office

Accountancy giant Ernst & Young (EY) has made its token and smart contract review service available for public testing.

STORY CONTINUES BELOW
Don't miss another story.Subscribe to the The Protocol Newsletter today. See all newsletters

Launched earlier on Wednesday, the public beta version allows users to paste code for analysis, during which it identifies security risks by testing the functionality and efficiency of a smart contract, as well as evaluating the quality of the coding.

Currently the service can only review ERC-20-based smart contracts, which are written in the Solidity programming language. EY has not said whether it plans to expand support to other blockchain protocols in the future.

A Reddit post from a user called "pbrody," most likely EY’s global blockchain lead, Paul Brody, said the company planned to launch its testing service into production shortly.

EY initially unveiled the service – originally known as the EY Smart Contract Analyzer – in April, and has spent the eight months since testing the service in private beta.

By reviewing their tokens' code, investors will be able to monitor changes in the software and ensure tokens and smart contracts meet accepted industry standards, EY says. Tokens can also be stress-tested in a range of transaction scenarios, using data collected from the ethereum blockchain.

“Our clients are increasingly entrusting key enterprise business processes and valuable investments to software code,” Brody said in the April announcement. “We don’t run enterprise computing systems without anti-virus tools and it only makes sense to run blockchain-based investment systems with smart contract and token testing tools.”

EY’s review service will form part of the company’s broader Blockchain Analyzer, an analytics tool that compiles and reports transaction data, making financial reporting and auditing on the blockchain possible.

The second iteration of the Blockchain Analyzer, also unveiled in April, increased the number of supported protocols, including private blockchains, as well as enabling analysis of privacy enhancing, zero-knowledge proof-based transactions. An EY project for running private transactions on the ethereum blockchain, known as ‘Nightfall’, has also been integrated into Analyzer.

Back in October, EY said it had developed a blockchain tool for governments to track and analyze their own transactions, something the company said would improve transparency and accountability in the management of public funds.

More For You

Protocol Research: GoPlus Security

GP Basic Image

What to know:

  • As of October 2025, GoPlus has generated $4.7M in total revenue across its product lines. The GoPlus App is the primary revenue driver, contributing $2.5M (approx. 53%), followed by the SafeToken Protocol at $1.7M.
  • GoPlus Intelligence's Token Security API averaged 717 million monthly calls year-to-date in 2025 , with a peak of nearly 1 billion calls in February 2025. Total blockchain-level requests, including transaction simulations, averaged an additional 350 million per month.
  • Since its January 2025 launch , the $GPS token has registered over $5B in total spot volume and $10B in derivatives volume in 2025. Monthly spot volume peaked in March 2025 at over $1.1B , while derivatives volume peaked the same month at over $4B.

More For You

New React bug that can drain all your tokens is impacting 'thousands of' websites

Hacker sitting in a room

Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.

What to know:

  • A critical vulnerability in React Server Components, known as React2Shell, is being actively exploited, putting thousands of websites at risk, including crypto platforms.
  • The flaw, CVE-2025-55182, allows remote code execution without authentication and affects React versions 19.0 through 19.2.0.
  • Attackers are using the vulnerability to deploy malware and crypto-mining software, compromising server resources and potentially intercepting wallet interactions on crypto platforms.