Bug Bounty
Light Protocol is hosting a bug bounty program.Security Audits
The Light protocol on-chain programs were audited by independent security firms Neodyme, OtterSec, Accretion, and Zellic.- Accretion audit report (January ‘25)
- Zellic audit report (September ‘24)
- Neodyme audit report (August ‘24)
- OtterSec audit report (July ‘24)
Groth16 Circuit Security
The ZK Compression circuit was formally verified by Reilabs. See the report here. Information about the Trusted Setup Ceremony for the groth16 circuits is here.For additional information on Light Protocol’s security policy, read here.