Read
Edit
History
Notify
Share
ChainLight
ChainLight is a blockchain security firm with award-winning experts in smart contract audits and on-chain monitoring. [1][2][3]
Overview
Established in 2016, ChainLight is a group of cybersecurity experts with a strong focus on Web3 infrastructure. The team provides secure blockchain solutions with a focus on prioritizing security. [2][1]
ChainLight conducts personalized audits to identify vulnerabilities and provides practical recommendations to enhance the security of Web3 applications. With no compromises to clients and victories in renowned competitions, ChainLight demonstrates its dedication to Web3 safety. [4]
“Our mission is clear: to stand by your side as your trusted partner, providing you with the security expertise needed to navigate and thrive in the Web3 ecosystem. With our deep knowledge and cutting-edge solutions, we ensure that your path to success is not only smooth but also fortified against any threats.” [1]
In November 2023, ChainLight discovered a vulnerability within the zkSync Era protocol that had the potential to result in a loss of $1.9 billion. This vulnerability was located in the zk-circuits of zkSync Era, which are responsible for validating transaction data integrity while maintaining the confidentiality of involved counterparties. [9][10]
Services
Security Audit
ChainLight's Security Audit has a history of zero client compromises and multiple competition victories. It identifies vulnerabilities and provides customized recommendations to improve the security of blockchain solutions. [5]
Organizations & protocols that ChainLight has carried out security audits for include Blur, Kroma, Klaytn, zkSync, TON, & Perpetual Protocol. [5]
Digital Asset Risk Tracker (DART)
Introduced in September 2023, DART functions as a Web3 risk management platform designed to identify both obvious and hidden risks that may evade initial assessments or security audits in digital assets and web3 projects. [6]
DART provides features such as Real-Time Latent Risk Tracking, Monitoring Insider Transactions, 1-day Vulnerability Analysis, Account Security Assessment, Token Supply Analysis, and Code Security Scan. [6][8]
Relic Protocol
Relic Protocol enables dApps to access all of Ethereum’s historical data with maximal security and minimal gas costs without trusting any centralized authority. [7]
Relic Protocol enables cryptographic verification of any data on-chain. As a result, dApps utilizing the Relic Protocol can access historical data without trusting any third-party intermediary. Via decentralization, Relic Protocol's smart contracts are immutable and permissionless so anyone can generate a proof and submit it to the Relic Protocol for verification. [7]
Team Competition Participation
- 2016: Participated in DEF CON 24, CODEGATE, HITCON, SECCON, and Plaid CTF
- 2017: Participated in DEF CON 25, CODEGATE, HITCON, SECCON, SCTF, and Plaid CTF
- 2018: Participated in DEF CON 26, CODEGATE, and SCTF
- 2019: Participated in DEF CON 27, CODEGATE, and Cyber Conflict Exercise
- 2020: Participated in DEF CON 28, CODEGATE, Hacker’s Playground, and Cyber Conflict Exercise
- 2021: Participated in DEF CON 29, HITCON, Hacker’s Playground, Realworld CTF, Cyber Conflict Exercise, and Whitehat Contest
- 2022: Participated in DEF CON 30, CODEGATE, Google CTF, Hacker’s Playground, Realworld CTF, Plaid CTF, WACON, Paradigm CTF, Cyber Conflict Exercise, and Whitehat Contest
- 2023: Participated in DEF CON 31, CODEGATE, HITCON, SECCON, Google CTF, Hacker’s Playground, Line CTF, Realworld CTF, Plaid CTF, Paradigm CTF, Dragonfly CTF, Quill CTF, Numen CTF, Ingonyama ZK CTF, Curta CTF, Rareskills CTF, Cyber Conflict Exercise, and Whitehat Contest. [1]
ChainLight
Commit Info
Edited By
Edited On
March 1, 2024
Feedback
Average Rating
How was your experience?
Give this wiki a quick rating to let us know!
Twitter Timeline
Loading
Media
REFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]