Blog

Rabby Wallet – Mobile Application (2nd Review)

Our team performed a security audit of the Rabby Wallet Mobile Application, which supports multiple hardware and software wallets for the Ethereum blockchain. The mobile application can manage and host dApps from numerous providers and enables users to interact with the hosted dApps through a unified interface. We previously audited

Read More »

Rabby Wallet – Extension (2nd Review)

Our team performed a security audit of Rabby Wallet, an application designed for managing assets on Ethereum and other EVM-compatible chains, available as both a mobile application and a browser extension, and based on a fork of MetaMask. We previously audited Rabby Wallet and delivered a final audit report on

Read More »

Linea – Limitless Prover

Our team performed a security audit of Linea’s Limitless Prover. The zkEVM aims to provide an execution environment equivalent to the Ethereum Virtual Machine (EVM), allowing Ethereum transactions and smart contract executions. The Limitless Prover feature enables proof generation without the need to impose limits due to the underlying arithmetization.

Read More »

Balancing Privacy-Enhancing Technologies and Legal Disclosure Obligations

Despite the preferences of data protection fundamentalists for minimal disclosure, disclosure obligations are legally required in several areas with the aim of protecting the integrity of the financial system and ensuring legal and ethical conduct. These include Know Your Customer (KYC) processes, beneficial ownership reporting, sanctions compliance, and tax reporting.

Read More »

Chia Network – Permuto

Chia Network has requested that Least Authority perform security audits of Permuto. Permuto consists of certificates issued by the Trust, which is formed solely to hold a single class of stock in a specified publicly traded company, with the first being shares of the common stock of Microsoft Corporation (NASDAQ:

Read More »

Conflux Network – VM Module

While Conflux retains full EVM bytecode compatibility in its Ethereum space, the protocol has been extended with collateral‐based storage economics, dual account spaces, and sponsorship mechanics. In this audit, we reviewed Conflux’s VM implementation. Our final audit report was completed on July 31, 2025. To read the full report, including

Read More »

Turning Milestones Into Meaning: The Depth Behind Our Audits

The Credibility Is in the Work All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 security audits, we wanted to take a moment to reflect on what this achievement

Read More »

Lightec – zkBTC Circuit + Smart Contracts

We performed a security audit of the zkBTC Circuit Implementation and Smart Contracts. zkBTC Bridge is a native zero‐knowledge proof-based cross‐chain protocol by Lightec that enables Bitcoin holders to convert BTC into an ERC-20 token, $zkBTC, on Ethereum at a 1:1 peg. Our final audit report was completed on June

Read More »
Archives