Blog

Chainsafe – Sygma

Least Authority has been requested to perform a security audit of Sygma. Sygma provides an interoperability layer between blockchains and is intended to facilitate cross-chain functionality for dApps. The system is composed of a network of validators that run the relayer implementation, and smart contracts on the source and destination

Read More »

Dodgecoin – Node Upgrades

Least Authority has been requested to perform a security audit of changes to the Dogecoin Core codebase between version 1.14.3 and version 1.14.5.The goal of the audit is to identify any potential security issues that could impact network operations resulting from the deployment of the upgrade to version 1.14.5. Our

Read More »

Zest Protocol

Least Authority performed a security audit of Zest Protocol, a lending platforms which allows institutions to borrow on-chain loans in Bitcoin that are collateralized by off-chain assets. To read the full report, including our findings, click here: Report

Read More »

Holochain – Deterministic Integrity Crate

Least Authority performed a security audit of the Holochain Deterministic Integrity. Our team performed a comprehensive design review and audit of the Holochain Deterministic Integrity (HDI) crate, a critical component of the Holochain system. Overall, we found the HDI crate to be highly modular and organized in a logical, compartmentalized

Read More »

Magic Protocol

Least Authority has been requested to perform a security audit of the Magic Protocol. Magic Protocol aims to provide a means for holders of BTC to swap for the Wrapped bitcoin token, xBTC, on the Stacks blockchain. To read the full report including our findings, click here: Report

Read More »

Holochain – Lair Keystore

Holo Ltd has requested that Least Authority perform a security audit of the Lair Keystore. The Lair Keystore is the secure keystore that holds private keys and seed and performs any and all cryptographic functions, which need to use private keys for the various Holochain subsystems requiring decryption, encryption, or

Read More »
Archives