Blog

Polygon – Starky and zkEVM Kernel

Our team performed a security audit of Starky and zkEVM Kernel code in Polygon‘s zkEVM implementation. Our final audit report was completed on August 22, 2024. To read the full report, including our findings, click here: Report

Read More »

Polygon – Plonky3

Our team performed a comprehensive audit of Polygon’s Plonky3, a toolkit for an efficient implementation of a non-hiding STARK protocol. The codebase consists of different cryptographic building blocks (such as fields, hash functions, polynomial commitment schemes, and others) that can be combined into STARKs. The overall goal is to build

Read More »

Polygon – Heimdall and Bor

We performed a security audit of Polygon’s Heimdall and Bor implementations. Bor is a Go implementation of the Matic protocol (Polygon), which is a fork of Go Ethereum and proof-of-stake (PoS) layer 2 designed to optimize transaction efficiency and provide quick transaction finality, relative to Ethereum. Heimdall is a validator

Read More »

Polygon – Plonky2

Least Authority performed a security audit of Plonky2 implementation of Polygon Zero, a library for recursive SNARKs. To read the full report including our findings, click here: Report

Read More »
Archives