Trust Machines – BNS v2
Our team performed a comprehensive audit of Trust Machines‘ Bitcoin Name System, BNS-v2. Our final audit report was completed on August 30, 2024. To read the full report, including our findings, click here: Report
Our team performed a comprehensive audit of Trust Machines‘ Bitcoin Name System, BNS-v2. Our final audit report was completed on August 30, 2024. To read the full report, including our findings, click here: Report
Our team performed a security audit of Silent Protocol smart contracts. The Silent Protocol is a multi-asset shielded pool, with cross-chain capabilities through integration with the Layer Zero Protocol. Silent Protocol facilitates shielded asset transfer of ERC-20 and native tokens. Our final audit report was completed on September 2, 2024.
Our team performed a security audit of Starky and zkEVM Kernel code in Polygon‘s zkEVM implementation. Our final audit report was completed on August 22, 2024. To read the full report, including our findings, click here: Report
We performed a security audit of Gnosis Hashi — an Ethereum Virtual Machine (EVM) Hash Oracle Aggregator that utilizes third-party hash oracles to aggregate hashed data, such as block headers or other arbitrary messages, in order to facilitate secure cross-chain communication. We completed our final audit on July 18, 2024.
Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build
Our team performed a security audit of Phantom, a non-custodial, multi-chain wallet, which allows users to trade, receive, send, and store their assets. Our final audit report was completed on June 7, 2024. To read the full report, including our findings, click here: Report
For this audit, we performed research, investigation, and review of Avalanche Core Web for Ava Labs followed by issue reporting, along with mitigation and remediation instructions as outlined in this report. To read the full report including our findings, click here: Report
Ava Labs has requested that Least Authority perform a second security audit of their Avalanche Core Mobile Wallet. To read the full report, including our findings, click here: Report