Security

Bug Bounty

Light Protocol is hosting a bug bounty program.

Security Audits

The Light protocol on-chain programs were audited by independent security firms Neodyme, OtterSec, Accretion, and Zellic.

A complete list of 3rd party audits can be found here.

Groth16 Circuit Security

The ZK Compression circuit was formally verified by Reilabs. See the report here.

Information about the Trusted Setup Ceremony for the groth16 circuits is here.

For additional information on Light Protocol's security policy, read here.

Last updated

Was this helpful?