Security Consulting Services

From prototype to production, we help projects improve their security.

Spec & White Paper Reviews

Penetration Testing & Red Team Activities

Security by Design Consultation

Source Code Audits

Network & Traffic Analysis

Mechanism & Incentive Design

Decentralized Systems Architecture

Blockchains, Cryptocurrencies & Distributed Ledgers

Audit Process

1

Schedule a call.

We learn about your security needs and tell you about how we work.

2

Get a quote.

We’ll prepare a project proposal, including a timeline and budget.

3

Conduct the audit.

Our team of security researchers work with you to improve the security of your product.

4

Review findings.

Based on our recommendations, we support your team to address the issues identified.

5

Finalize report.

We verify the security issues that have been addressed and deliver a final report (publishing optional).

Featured Audits

Ethereum 2.0 Specifications

March 2020 – The Ethereum Foundation has requested that Least Authority perform a security audit of the Ethereum 2.0 Consensus and Networking specifications. Ethereum 2.0, a Proof of Stake (PoS) / sharded protocol, is a major network upgrade that is set to take place in 3 distinct phases: Phase 0 – Beacon Chain, Phase 1 – Shard Chains, and Phase 2 – Execution Environments. This audit is to be performed as in preparation for the Phase 0 mainnet launch in April 2020.

ProgPow Algorithm

September 2019 – Ethereum Cat Herders, Ethereum Foundation, and Bitfly have requested that Least Authority perform a security audit of ProgPow, a Programmatic Proof-of-Work (PoW) algorithm to replace Ethash, in order to verify the security of the algorithm and provide clear metrics about its performance.

MetaMask Mobile Application

April 2019 – MetaMask has requested that Least Authority perform a security audit of their mobile application, a wallet and developer tool for applications built on Ethereum. MetaMask allows users to browse the web and interact with Ethereum applications, sign messages and transactions, and securely manage and store their private keys and assets.

Five Security Audits for the Tezos Foundation

March 2019 – We are happy to release the results of the five security audits that Least Authority performed in 2018 for the Tezos Foundation, a Swiss non-profit organization that supports Tezos, a distributed, peer-to-peer, permissionless network, and the community around it. This series of security audits were done as part of the Tezos Foundation’s effort to improve the security of the Tezos protocol and greater ecosystem.