hashi
  • Welcome
  • Introduction
    • What is Hashi?
    • Why Hashi?
    • Key Features
    • The SSN
  • Getting Started
    • How Hashi Works
    • Quick Start
      • Verifying foreign event
        • Setting the scene
        • Getting the Event Proof
        • Validating your statements
      • Reading foreign state
        • Setting the scene
        • Getting the Storage Proof
        • Validating your statements
      • Pushing a message
        • Writing your message sending contract
        • Implementing your callback
        • Waiting for the cross-chain execution
  • Core Concepts
    • Block Header Relaying
    • Message Dispatching
    • Oracles
    • Additive Security Model
  • Deployments
    • Blockchains
    • Oracles
  • Smart Contracts
    • Key Contracts
    • HashiProver API
  • TOOLS
    • SP1 storage proof verifier
    • Solana integration
  • APPS / INTEGRATIONS
    • Safe Crosschain
    • Aragon UCG
    • Openfort Chain Abstraction
  • META
    • Developer resources
    • Audits
    • Explorer
    • Community
Powered by GitBook
On this page
  • g0 Audits (March 2024 & June 2024)
  • Omega Audit (June 2024)
  • Least Authority Audit (June 2024)
Export as PDF
  1. META

Audits

PreviousDeveloper resourcesNextExplorer

Last updated 7 months ago

Hashi is committed to ensuring the security and reliability of its protocol. To this end, it regularly undergoes comprehensive third-party security audits. Below are the completed audit reports, which assess the key security components of Hashi.

g0 Audits (March 2024 & June 2024)

The g0 audits evaluated the security of Hashi’s core components, including oracle integration, block header aggregation, and cross-chain message dispatching.

Omega Audit (June 2024)

The Omega audit focused on Hashi’s integration with the Gnosis Bridge, assessing the interaction between Hashi’s oracle system and the cross-chain relaying mechanism.

Least Authority Audit (June 2024)

The Least Authority audit examined Hashi’s multi-oracle validation system and overall security architecture, ensuring its resilience against potential security threats.

View Full March 2024 Audit Report
View Full June 2024 Audit Report
View Full Audit Report by Omega
View Full Audit Report by Least Authority