Skip to main content

Bug Bounty

Light Protocol is hosting a bug bounty program.

Security Audits

The Light protocol on-chain programs were audited by independent security firms Certora, OtterSec, Accretion, HashCloak, Neodyme, and Zellic.
FirmScopeDateReport
CertoraLight TokenDecember ‘25View
OtterSecCPI Context RefactorDecember ‘25View
AccretionZK Compression v2June ‘25View
OtterSecBatched Merkle TreesJune ‘25View
HashCloakCompressed Token & ZK Compression v2March ‘25View
OtterSecZerocopyMarch ‘25View
AccretionCompressed Token Program UpdateJanuary ‘25View
ZellicZK Compression v1September ‘24View
NeodymeZK Compression v1August ‘24View
OtterSecZK Compression v1August ‘24View

Groth16 Circuit Security

The ZK Compression circuit was formally verified by Reilabs. See the report here. Information about the Trusted Setup Ceremony for the groth16 circuits is here.
For additional information on Light Protocol’s security policy, read here.