Posts by emilie.raffo@chainsecurity.com

"*" indicates required fields

Request Audit

Please answer the questions below and click the Submit button.
DD slash MM slash YYYY
When will your code be 100% finished and ready for audit?
Book an Audit

Circom assertions: misconceptions and deceptions

TL;DR Assertions do not add any constraints Recently we stumbled upon Circom’s assert() statements that were used to enforce some constraints in a project implementing a UTXO-based optimistic privacy-preserving L2. Sadly, it is not a magic tool that allows programmers to go over the complexity of expressing some non-trivial constraints. This article is not meant…

Read More