Blog

Zcash – Zebra NU6 Updates

As the Zcash Ecosystem Security Lead and based on direction of the Zcash Community Grants (ZCG) program, Least Authority reviewed the changes made to Zebra that will be introduced in the NU6 network upgrade. Zebra is Zcash’s independent, consensus-compatible implementation of a Zcash node, written in Rust. Our final audit

Read More »

Zcash – Zcashd NU6 Updates

As the Zcash Ecosystem Security Lead appointed by Zcash Community Grants (ZCG), Least Authority reviewed the changes made to Zcashd that will be introduced in the NU6 network upgrade. Our final audit report was completed on October 21, 2024. To read the full report, including our findings, click here: Report

Read More »

Rabby Wallet

DeBank has requested that Least Authority perform a security audit of Rabby Wallet, a Web3 wallet offering users a multi-chain DeFi experience. Our final audit report was completed on October 18, 2024. To read the full report, including our findings, click here: Report

Read More »

Linea – Gnark Cryptographic Library

Consensys Software, Inc. requested that Least Authority perform security audits of the Linea prover and cryptography libraries. This audit is Phase 1 and focuses specifically on the gnark library. Our final audit report was completed on September 20, 2024. To read the full report, including our findings, click here: Report

Read More »

Trust Machines – BNS v2

Our team performed a comprehensive audit of Trust Machines‘ Bitcoin Name System, BNS-v2. Our final audit report was completed on August 30, 2024. To read the full report, including our findings, click here: Report

Read More »

Polygon – Starky and zkEVM Kernel

Our team performed a security audit of Starky and zkEVM Kernel code in Polygon‘s zkEVM implementation. Our final audit report was completed on August 22, 2024. To read the full report, including our findings, click here: Report

Read More »

Gnosis – Hashi

We performed a security audit of Gnosis Hashi — an Ethereum Virtual Machine (EVM) Hash Oracle Aggregator that utilizes third-party hash oracles to aggregate hashed data, such as block headers or other arbitrary messages, in order to facilitate secure cross-chain communication. We completed our final audit on July 18, 2024.

Read More »

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »
Archives