Blog

The State of Grant Funding for the Security of Web3

In Part 1 of this blog, we delved into the constantly changing world of Web3, unveiling the opportunities it presents. In Part 2, we’re continuing this exploration with a focus on the types of projects receiving support, with a particular emphasis on improving security — a critical yet often overlooked

Read More »

World – Protocol Cryptography (2nd Review)

Our team conducted a second review of the upgrades to World‘s semaphore-mtb and the signup sequencer. Previously, our team had conducted a review of an earlier version of the codebase, which included World’s Rust implementation of the semaphore protocol and the Go implementation of the Semaphore Merkle Tree Batcher (SMTB).

Read More »

The Current Outlook on Web3 Grant Funding

In recent years the Web3 space, known for its innovation and community driven approaches, has witnessed a significant shift in its approach to funding and supporting projects. We have identified more than 150 funding opportunities since we began researching them in October 2023, and new grant programs are continuously emerging.

Read More »

Capsule – Signing and Permissioning Toolkit

Least Authority, performed a security audit of Capsule Signing and Permissioning Toolkit. The Capsule is designed as a support system, providing several software development kits (SDKs) as well as infrastructure that can be used by developers and partner projects. Our final audit report was completed on January 3, 2024. An

Read More »

Capsule – MetaMask Snap

Capsule requested that Least Authority perform a security audit of their MetaMask Snap and conduct their review in accordance with industry best practices. Least Authority performed a security audit of  MetaMask Snap. To read the full report including our findings, click here: Report

Read More »

Fungify – Smart Contracts

Least Authority performed a security audit of Fungify Smart Contracts. For this audit, we performed research, investigation, and review of the Fungify smart contracts followed by issue reporting, along with mitigation and remediation instructions as outlined in this report. To read the full report including our findings, click here: Report

Read More »
Archives