Blog

Gnosis – Hashi

We performed a security audit of Gnosis Hashi — an Ethereum Virtual Machine (EVM) Hash Oracle Aggregator that utilizes third-party hash oracles to aggregate hashed data, such as block headers or other arbitrary messages, in order to facilitate secure cross-chain communication. We completed our final audit on July 18, 2024.

Read More »

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »

Phantom Wallet

Our team performed a security audit of Phantom, a non-custodial, multi-chain wallet, which allows users to trade, receive, send, and store their assets. Our final audit report was completed on June 7, 2024. To read the full report, including our findings, click here: Report

Read More »

Avalanche – Core Web

For this audit, we performed research, investigation, and review of Avalanche Core Web for Ava Labs followed by issue reporting, along with mitigation and remediation instructions as outlined in this report. To read the full report including our findings, click here: Report

Read More »

Security Audit Reports: A Guide for Everyone

In 2014, we published our first security audit report. Since then, we have completed more than 200 audits and published more than half of those. The primary audience of an audit report is the client’s project development team. However, stakeholders and other interested parties can also find value in reading

Read More »

A Decade of Enabling Security-By-Design for Emerging Technologies

In January, we celebrated the 10-year anniversary of our first ever published security audit report. At the time of our first review, security consulting for privacy-enhancing and distributed technologies was a fledgling industry, and there were very few companies, like us, offering our specialized knowledge and expertise for security analysis

Read More »
Archives