In order to increase the transparency of our processes, we have compiled a list of Frequently Asked Questions for our Security Consulting work. The FAQs page provides details about our services, including: An Overview of Our Services, Planning and Preparing for a Security Audit, Responding to and Managing the Findings.
Overview ChainSafe has requested that Least Authority perform a security audit of their Lodestar utility libraries. Lodestar is an Ethereum 2.0 implementation of the Beacon Chain. The following utility libraries are considered in scope: Persistent Merkle Tree: https://github.com/chainsafe/persistent-merkle-tree BLS key derivation and hd key utilities: https://github.com/ChainSafe/bls-hd-key Key management for BLS
The Tezos Foundation requested that Least Authority perform a security audit of TzBTC, a BTC-backed token on Tezos. TzBTC enables the compliant issuance of a fully Bitcoin-backed token on the Tezos blockchain while aiming to eradicate the risks of a single-point-of-failure. This is achieved by dividing the various tasks into