All Published Audits (ex. 2)

All Published Audits (ex. 3)

August 2020

Band Protocol’s Cosmos-SDK Oracle Module – Report

June 2020

Tezos Foundation’s Taquito – Report

Protocol Labs’ Gossipsub v1.1 Protocol Design + Implementation – Blog PostReport

 

May 2020

Tezos Foundation’s TezosKit – Report

 

April 2020

Centrifuge Chain – Report

Centrifuge’s Tinlake Contracts + Actions – Report

 

March 2020

Ethereum Foundation’s Ethereum 2.0 Specifications – Report

Tezos Foundation’s BTG Pactual ReitBZ Token + Token Management Dashboard – Report

Tezos Foundation’s TzBTC – Report

ChainSafe Systems’ Utility Libraries – Report

ConsenSys AG’s MetaMask Plugin System + LavaMoat – Report

TRON Protocol – Report

December 2019

ConsenSys AG’s MetaMask Permissions System + CapNode – Report

Contact Us

Have a question about the security of your blockchain project? Send us a note and we’ll get back to you within 24hrs.

FAQ

Most frequently asked questions and answers.

An average audit takes about 2-6 weeks. However, the timeline depends on many factors, including your schedule requirements, the scope of the project and the availability of our engineers who are best suited for each audit. After an initial call, and once we have the information we need, we will send you a proposal within a week. The proposal will have scope details, areas of concern, and a potential schedule, along with the cost of the audit.

Yes! The final report is for you to share (or not share) however you wish. With your permission, we may also publish it on our website.

The choice to publish the final report to a public audience is entirely up to you. Least Authority only speaks publicly about the projects that we have permission to do so. Some clients see the audit as a good opportunity to inform public stakeholders about their efforts to improve the security of their projects and we encourage this. However, we respect the choice that oOther clients may prefer that their security audit process be kept entirely confidential.

In some cases, we may continue to collaborate with you to share knowledge with the larger community. This could be a blog post, a coordinated release, or other forms of informing stakeholders, like our panel discussion about the ProgPoW audit at DevCon5.

No, this is not a simple calculation since the scope of our audits and needs of our clients vary greatly. However, with a few important pieces of information we can usually get a proposal, including cost, to you within a week. We do our projects based on a fixed fee and invoice our clients on project deliverables, rather than offeringuse estimates and invoicinge for time spent. 

Since the initial report brings attention to the vulnerabilities in the code, we recommend that clients resolve the issues as soon as possible to quickly bring confidence to their stakeholders, especially any users of the system. Significant changes to the codebase usually happen over time, so delays could render the audit results obsolete.

We have found, however, that nearly all of our clients manage to address the issues found (that they intend to fix) within 90 days of the delivery of the initial audit report. So, we set the maximum time we wait for responses to the initial report to 90 days, as explained further in the questions below.

In the event that you do not resolve critical security/privacy vulnerabilities in software prior to the release of the final audit report, Least Authority will note that the issues and suggestions remain unresolved.

Spec & White Paper Reviews

Penetration Testing & Red Team Activities

Security by Design Consultation

Source Code Audits

Network & Traffic Analysis

Mechanism & Incentive Design

Decentralized Systems Architecture

Blockchains, Cryptocurrencies & Distributed Ledgers

Audit Process

1

Schedule a call

We learn about your security needs and tell you about how we work.

2

Get a quote

We’ll prepare a project proposal, including a timeline and budget.

3

Conduct the audit

Our team of security researchers work with you to improve the security of your product.

4

Review findings

Based on our recommendations, we support your team to address the issues identified.

5

Finalize report

We verify the security issues that have been addressed and deliver a Final Report (publishing optional).

FEATURED AUDITS

Ethereum 2.0 Specifications

March 2020 –The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. This audit is to be performed as in preparation for the Phase 0 mainnet launch in April 2020.

ProgPow Algorithm

September 2019 – Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replace Ethash, in order to verify the security of the algorithm and provide clear metrics about its performance.

MetaMask Mobile Application

April 2019 – MetaMask has requested that Least Authority perform a security audit of their mobile application, a wallet and developer tool for applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets.

Five Security Audits for the Tezos Foundation​

March 2019 – We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s effort to improve the security of the Tezos protocol and greater ecosystem.