Blog

ChainSafe – Lodestar Utility Libraries

Overview ChainSafe has requested that Least Authority perform a security audit of their Lodestar utility libraries. Lodestar is an Ethereum 2.0 implementation of the Beacon Chain. The following utility libraries are considered in scope: Persistent Merkle Tree: https://github.com/chainsafe/persistent-merkle-tree BLS key derivation and hd key utilities: https://github.com/ChainSafe/bls-hd-key Key management for BLS

Read More »

TQ Tezos – TzBTC for Tezos Foundation

Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into keyholders

Read More »

Ethereum 2.0 Specifications

The Least Authority team recently completed our audit of the Ethereum 2.0 Specifications. Read our full report here.  Ethereum 2.0 will be a significant network upgrade and is set to take place in 3 distinct phases—Phase 0: Beacon Chain, Phase 1: Shard Chains, and Phase 2: Execution Environments. It is

Read More »

TRON Protocol

TRON has requested that Least Authority perform a security audit of their TRON Protocol, including the following components: TRON Protocol Blockchain-based operating systems that aims to offer scalable, high-availability and high-throughput support that underlies all the decentralized applications in the TRON ecosystem. TRON Virtual Machine (TVM) Allows users to develop

Read More »

MetaMask – Plugin System + LavaMoat

ConsenSys AG has requested that Least Authority perform a security audit of MetaMask, a browser extension that enables interaction with applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets. 

Read More »
Archives