The Credibility Is in the Work
All audits are significant in their own ways, but some stand out for their technical complexity, ecosystem influence, or global significance. As we approach the milestone of having completed 300 security audits, we wanted to take a moment to reflect on what this achievement represents.
Within the industry, there’s often an emphasis on the number of audits completed. While it’s a milestone we’re glad to acknowledge, our focus has always been on the quality of each audit rather than the overall count. Our emphasis on quality is reflected in the fact that nearly 200 of these audits have been published on our website. Since the decision to publish rests with the client, we regard each audit with equal technical rigor, whether published or not.
This commitment to depth and consistency is why, even as we work to support more projects, we continue to prioritize quality because that is what builds trust and long-term impact for clients and stakeholders.
Why Quality Matters in Security Audits
A well-done audit can protect sensitive user data or prevent millions in losses. Superficial, fully automated, or rushed audits can create a false sense of security. For us, producing a quality report means deep protocol understanding, clear communication of risks, actionable recommendations, and long-term thinking, not just patch-and-ship fixes. Comprehensive reviews are necessary, both for individual audits and for long-term engagements that involve multiple audits, to deliver even more security.
Our Approach to Audit Quality
Relationships are one of the keys to ensuring effective two-way communication with clients. From the initial exchange of information, we work with a transparent process and make our reviews a collaborative effort. Our security audits aim to enhance system quality and ensure sufficient remediation to help protect users. We even provide up to 90 days of incident response support to address any further issues that emerge after the audit. Our March 2025 blog post takes a deeper look at how we work, sharing more about our approach and methodology.
A Closer Look: Audits That Reflect Our Values
While every audit we perform receives the same careful attention, some stand out for their broader impact, technical ambition, or role in shaping critical ecosystems. These projects highlight the kind of work we’re proud to support. They include audits that not only help secure code, but influence industry standards and end-user trust. Additionally, our auditing team has their own favorites. These are projects that personally appeal to them or use technology they find rewarding to work with, and we highlight several of them below:
Why it matters: We reviewed the implementation of the Linea zkEVM as well as the underlying proving system Wizard-IOP and accompanying libraries. Linea is a general-purpose zkEVM rollup developed by Consensys. Our team analyzed the building blocks of Vortex and Arane, because these elements are essential to a secure scaling of Ethereum with zero-knowledge proofs.
Core DAO Layer 1 Smart Contracts
Why it matters: As Core DAO builds a Layer 1 blockchain based on Bitcoin and Ethereum interoperability, its smart contracts play a foundational role. Our audit provided critical insights at a stage where long-term network trust and validator incentives were being finalized.
Mina Ledger Application (O(1) Labs)
Why it matters: Mina Protocol aims to be the lightest blockchain in the world, using recursive zk-SNARKs to minimize chain size. Our review of the Ledger hardware wallet integration helped strengthen the security of private key usage for a privacy-preserving chain.
Why it matters: Auditing parts of the Ethereum 2.0 specification gave us the opportunity to contribute to one of the most globally impactful protocols. This early work on the Beacon Chain specification contributed to the robustness of the Ethereum upgrade path.
Why it matters: MetaMask is a core access point for millions of users interacting with Web3. Our mobile application audit addressed real-world privacy concerns, reinforcing security on a platform widely used across the globe by both new and experienced users.
How This Milestone Shapes Our Progress
Reaching 300 completed audits shows consistency, experience, and trust from the ecosystem, but what makes this milestone meaningful and not just a vanity metric is the depth of the work behind them. By upholding the highest standards of rigor and committing to precision and depth, our audits set us apart and deliver uniquely impactful results.
Looking Ahead
What will the next 100 audits bring? Moving forward, as the ecosystems we serve continue to grow in complexity and scale, we know that the challenges ahead will demand even more thorough, collaborative, and thoughtful security practices.
We expect to see:
- Continued growth in zero-knowledge technologies, formal verification, and privacy-preserving systems;
- An increased need for cross-disciplinary reviews that blend protocol design, cryptography, and regulatory awareness; and
- New opportunities to support projects that treat security and privacy not as features but as foundations.
Whether we’re working with small research teams or globally deployed infrastructure, our focus is always the same: no matter the size or stage of the project, our audits remain informed, honest, and high-quality.
If you’re building something, it’s worth protecting. We’d love to hear from you.