Posts by emilie.raffo@chainsecurity.com

"*" indicates required fields

Request Audit

Please answer the questions below and click the Submit button.
DD slash MM slash YYYY
When will your code be 100% finished and ready for audit?
Interested in future emergency slots?
We'll send you automated emails if audit slots become available on short-notice. You can opt out anytime. This is not a newsletter.
Book an Audit

Circom assertions: misconceptions and deceptions

TL;DR Assertions do not add any constraints Recently we stumbled upon Circom’s assert() statements that were used to enforce some constraints in a project implementing a UTXO-based optimistic privacy-preserving L2. Sadly, it is not a magic tool that allows programmers to go over the complexity of expressing some non-trivial constraints. This article is not meant…

Read More