Audits are point-in-time assessments of a protocol or an implementation. They allow projects and companies to get more assurance that their offerings provide a baseline of security. As part of our work we provide audits of zero-knowledge proof systems, their applications, and the protocols that make use of them (for example, secure multi-party computation protocols).
Read more about what zk security encompassesAs we're in the front of this nascent field, we must keep ourselves up-to-date with the latest schemes and protocols. As part of this work we freely publish what we learn as open source projects.
Read more about our open-source projectsAs part of our work, we also conduct research in the latest techniques and ways to find vulnerabilities in zk applications.
Read more about the kind of bugs that we find in zk applications