2025 Year in Review

A year of groundbreaking research, innovative tools, and security excellence

0 Blog Posts
0 Foundational Tools
0 Security Audits

Explore by Category

Refine by topic:

Detect Go's silent arithmetic bugs with go-panikint

Introducing go-panikint, a tool to detect Go's silent arithmetic bugs including integer overflow and division by zero that can lead to critical vulnerabilities in blockchain and other systems.

December 31, 2025

Can chatbots craft correct code?

LLMs fundamentally differ from compilers because they lack determinism and semantic guarantees, making them useful coding assistants but unreliable for autonomous code generation without human review and formal verification.

December 19, 2025

Use GWP-ASan to detect exploits in production environments

GWP-ASan is a sampling-based memory error detection tool that catches critical bugs like use-after-free and buffer overflows in production environments with near-zero performance overhead.

December 16, 2025

Catching malicious package releases using a transparency log

Getting Sigstore's rekor-monitor ready for production use, making it easier for developers to detect tampering and unauthorized uses of their identities in the Rekor transparency log.

December 12, 2025

Introducing mrva, a terminal-first approach to CodeQL multi-repo variant analysis

A terminal-first tool for running CodeQL multi-repository variant analysis locally, allowing users to download pre-built databases, analyze them with custom queries, and view results directly in the terminal.

December 11, 2025

Introducing constant-time support for LLVM to protect cryptographic code

Trail of Bits developed constant-time coding support for LLVM that prevents compilers from breaking cryptographic implementations vulnerable to timing attacks, introducing the __builtin_ct_select family of intrinsics.

December 2, 2025

We found cryptography bugs in the elliptic library using Wycheproof

Trail of Bits discovered and disclosed two vulnerabilities in the widely used elliptic JavaScript library that could allow signature forgery or prevent valid signature verification.

November 18, 2025

Level up your Solidity LLM tooling with Slither-MCP

Releasing Slither-MCP, a new tool that augments LLMs with Slither's unmatched static analysis engine.

November 15, 2025

How we avoided side-channels in our new post-quantum Go cryptography libraries

Released open-source Go implementations of ML-DSA and SLH-DSA post-quantum cryptographic algorithms.

November 14, 2025

Building checksec without boundaries with Checksec Anywhere

Checksec Anywhere consolidates fragmented binary security analysis tools into a browser-based platform that analyzes ELF, PE, and Mach-O formats locally without compromising privacy or performance.

November 13, 2025

Balancer hack analysis and guidance for the DeFi ecosystem

A retrospective on the $100M Balancer hack that occurred in November 2025, including long-term, strategic guidance on how to avoid similar bugs.

November 7, 2025

The cryptography behind electronic passports

This blog post describes how electronic passports work, the threats within their threat model, and how they protect against those threats using cryptography.

October 31, 2025

Vulnerabilities in LUKS2 disk encryption for confidential VMs

Trail of Bits is disclosing vulnerabilities in confidential computing systems that use LUKS2 for disk encryption. These vulnerabilities allow attackers with access to storage disks to extract confidential data.

October 30, 2025

Prompt injection to RCE in AI agents

We bypassed human approval protections for system command execution in AI agents, achieving RCE in three agent platforms.

October 22, 2025

Taming 2,500 compiler warnings with CodeQL, an OpenVPN2 case study

Created a CodeQL query that reduced 2,500 compiler warnings about implicit conversions in OpenVPN2 to just 20 high-priority cases.

September 25, 2025

Supply chain attacks are exploiting our assumptions

Supply chain attacks exploit fundamental trust assumptions in modern software development, from typosquatting to compromised build pipelines.

September 24, 2025

Use mutation testing to find the bugs your tests don't catch

Mutation testing reveals blind spots in test suites by systematically introducing bugs and checking if tests catch them.

September 18, 2025

Fickling's new AI/ML pickle file scanner

Added a pickle file scanner to Fickling that uses an allowlist approach to protect AI/ML environments from malicious pickle files.

September 16, 2025

How Sui Move rethinks flash loan security

Sui's Move language significantly improves flash loan security by replacing Solidity's reliance on callbacks with a "hot potato" model that enforces repayment at the language level.

September 10, 2025

Safer cold storage on Ethereum

By using smart contract programmability, exchanges can build custody solutions that remain secure even when multisig keys are compromised.

September 5, 2025

Subverting code integrity checks to locally backdoor Signal, 1Password, Slack, and more

A vulnerability in Electron applications allows attackers to bypass code integrity checks by tampering with V8 heap snapshot files.

September 3, 2025

Intern projects that outlived the internship

Our business operations intern built two AI-powered tools that became permanent company resources—a podcast workflow that saves 1,250 hours annually and a Slack exporter.

August 28, 2025

Implement EIP-7730 today

EIP-7730 enables hardware wallets to decode transactions into human-readable formats, eliminating blind signing vulnerabilities.

August 27, 2025

Speedrunning the New York Subway

We optimized the route for visiting every NYC subway station using algorithms from combinatorial optimization, creating a 20-hour tour that beats the existing world record by 45 minutes.

August 25, 2025

Weaponizing image scaling against production AI systems

Details how attackers can exploit image scaling on Gemini CLI, Vertex AI Studio, and other production AI systems. Introduces Anamorpher, an open-source tool.

August 21, 2025

Marshal madness: A brief history of Ruby deserialization exploits

This post traces the decade-long evolution of Ruby Marshal deserialization exploits, demonstrating how security researchers have repeatedly bypassed patches.

August 20, 2025

Trail of Bits' Buttercup wins 2nd place in AIxCC Challenge

Our team won the runner-up prize of $3M at DARPA's AI Cyber Challenge, demonstrating Buttercup's world-class automated vulnerability discovery capabilities.

August 9, 2025

Buttercup is now open-source!

Now that DARPA's AI Cyber Challenge (AIxCC) has officially ended, we can finally make Buttercup, our CRS (Cyber Reasoning System), open source!

August 8, 2025

AIxCC finals: Tale of the tape

Differences in the finalists' approaches show that there are multiple viable paths forward to using AI for vulnerability detection.

August 7, 2025

Prompt injection engineering for attackers: Exploiting GitHub Copilot

We design and implement a prompt injection exploit targeting GitHub's Copilot Agent.

August 6, 2025

Uncovering memory corruption in NVIDIA Triton (as a new hire)

In my first month at Trail of Bits as an AI/ML security engineer, I found two remotely accessible memory corruption bugs in NVIDIA's Triton Inference Server.

August 4, 2025

The Unconventional Innovator Scholarship

Trail of Bits founder Dan Guido establishes a $2,500 scholarship at his alma mater, Mineola High School, to recognize students who demonstrate the hacker spirit.

August 1, 2025

Hijacking multi-agent systems in your PajaMAS

Releasing pajaMAS: a curated set of MAS hijacking demos that illustrate important principles of MAS security.

July 31, 2025

We built the security layer MCP always needed

Announcing the beta release of mcp-context-protector, a security wrapper for LLM apps using the Model Context Protocol (MCP).

July 28, 2025

Exploiting zero days in abandoned hardware

We successfully exploited two discontinued network devices at DistrictCon's inaugural Junkyard competition, demonstrating why end-of-life hardware poses persistent security risks.

July 25, 2025

Inside EthCC[8]: Becoming a smart contract auditor

At EthCC[8], Trail of Bits blockchain security engineer Nicolas Donboly laid out a clear, actionable path for aspiring smart contract auditors.

July 23, 2025

Detecting code copying at scale with Vendetect

Vendetect is our new open-source tool for detecting copied and vendored code between repositories using semantic fingerprinting.

July 21, 2025

Building secure messaging is hard: A nuanced take on the Bitchat security debate

The release of Bitchat last week was met with a mixture of glowing praise and sharp criticism. Both extremes bear some truth.

July 18, 2025

Investigate your dependencies with Deptective

Deptective, our new open-source tool, automatically finds the packages needed to install software dependencies by observing what the software needs at runtime.

July 8, 2025

Buckle up, Buttercup, AIxCC's scored round is underway!

Our CRS (Cyber Reasoning System), Buttercup, is now competing in the one and only scored round of DARPA's AI Cyber Challenge (AIxCC).

July 2, 2025

Maturing your smart contracts beyond private key risk

This post introduces a four-level maturity framework for designing protocols that can tolerate key compromise.

June 25, 2025

Unexpected security footguns in Go's parsers

File parsers in Go contain unexpected behaviors that can lead to serious security vulnerabilities.

June 17, 2025

What we learned reviewing one of the first DKLs23 libraries from Silence Laboratories

In October 2023, we audited Silence Laboratories' DKLs23 threshold signature scheme (TSS) library—one of the first production implementations.

June 10, 2025

A deep dive into Axiom's Halo2 circuits

Over two audits in 2023, we reviewed a blockchain system developed by Axiom that allows computing over the entire history of Ethereum, all verified by zero-knowledge proofs (ZKPs).

May 30, 2025

The Custodial Stablecoin Rekt Test

Introducing the Custodial Stablecoin Rekt Test; a new spin on the classic Rekt Test for evaluating the security maturity of stablecoin issuers.

May 29, 2025

The cryptography behind passkeys

This post will examine the cryptography behind passkeys, the guarantees they do or do not give, and interesting cryptographic things you can do with them.

May 14, 2025

Datasig: Fingerprinting AI/ML datasets to stop data-borne attacks

Datasig generates compact, unique fingerprints for AI/ML datasets that let you compare training data with high accuracy.

May 2, 2025

Making PyPI's test suite 81% faster

See how we slashed PyPI's test suite runtime from 163 to 30 seconds.

May 1, 2025

Insecure credential storage plagues MCP

This post describes how many examples of MCP software store long-term API keys for third-party services in plaintext on the local filesystem.

April 30, 2025

Deceiving users with ANSI terminal codes in MCP

This post describes attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM.

April 29, 2025

How MCP servers can steal your conversation history

Malicious MCP servers can inject trigger phrases into tool descriptions to exfiltrate entire conversation histories.

April 23, 2025

Jumping the line: How MCP servers can attack you before you ever use them

MCP's 'line jumping' vulnerability lets malicious servers inject prompts through tool descriptions to manipulate AI behavior.

April 21, 2025

Kicking off AIxCC's Finals with Buttercup

Trail of Bits' Buttercup competes in DARPA's AIxCC Finals with expanded resources, multiple rounds, and new challenge types.

April 21, 2025

Sneak peek: A new ASN.1 API for Python

We're working on integrating an ASN.1 API into PyCA Cryptography, built on top of the same Rust ASN.1 implementation.

April 18, 2025

Mitigating ELUSIVE COMET Zoom remote control attacks

This post describes a sophisticated social engineering campaign using Zoom's remote control feature and provides technical solutions.

April 17, 2025

Introducing a new section on snapshot fuzzing for kernel-level testing in the Testing Handbook

Learn snapshot fuzzing for kernel-level testing. New Testing Handbook section shows how to test drivers, antivirus software, and complex kernel components.

April 9, 2025

Benchmarking OpenSearch and Elasticsearch

Trail of Bits' independent study finds OpenSearch v2.17.1 is 1.6x faster than Elasticsearch v8.15.4 on Big5 workload.

March 6, 2025

Continuous TRAIL

Learn how to integrate TRAIL threat modeling into your SDLC, adapt and maintain models as your system evolves.

March 3, 2025

Threat modeling the TRAIL of Bits way

Discover TRAIL, Trail of Bits' systematic threat modeling approach that identifies design-level security weaknesses.

February 28, 2025

How Threat Modeling Could Have Prevented the $1.5B Bybit Hack

Learn how comprehensive threat modeling could have identified the operational security gaps that led to Bybit's $1.5B hack.

February 25, 2025

Don't recurse on untrusted input

We developed a simple CodeQL query to find denial-of-service (DoS) vulnerabilities in several high-profile Java projects.

February 21, 2025

The $1.5B Bybit Hack: The Era of Operational Security Failures Has Arrived

The $1.5B Bybit Hack demonstrates how the Era of Operational Security Failures has arrived.

February 21, 2025

Unleashing Medusa: Fast and scalable smart contract fuzzing

Introducing Medusa v1, a cutting-edge fuzzing framework designed to enhance smart contract security.

February 14, 2025

We're partnering to strengthen TON's DeFi ecosystem

TVM Ventures has selected Trail of Bits as its preferred security partner to strengthen the TON developer ecosystem.

February 13, 2025

The call for invariant-driven development

Writing smart contracts requires a higher level of security assurance than most other fields of software engineering.

February 12, 2025

Preventing account takeover on centralized cryptocurrency exchanges in 2025

This blog post highlights key points from our new white paper on preventing ATO-related attack vectors and defenses tailored to CEXes.

February 5, 2025

PyPI now supports archiving projects

PyPI now supports marking projects as archived. Project owners can now archive their project to let users know that the project is not expected to receive any more updates.

January 30, 2025

Best practices for key derivation

Key derivation is essential in many cryptographic applications, including key exchange, key management, and secure communications.

January 28, 2025

Celebrating our 2024 open-source contributions

While Trail of Bits is known for developing security tools like Slither, Medusa, and Fickling, our engineering efforts extend far beyond our own projects.

January 23, 2025

Vulnerabilities in LUKS2 disk encryption for confidential VMs

CVE-2025-59054, CVE-2025-58356 - Vulnerabilities allow attackers with access to storage disks to extract confidential data and modify contents.

Researcher: Tjaden Hess | 2025

Prompt injection to RCE in AI agents

Bypassed human approval protections for system command execution in AI agents, achieving RCE in three agent platforms.

Researcher: Will Vandevanter | 2025

Code integrity bypass in Electron applications

CVE-2025-55305 - Vulnerability in Electron applications allows attackers to bypass code integrity checks by tampering with V8 heap snapshot files, enabling local backdoors in Signal, 1Password, Slack.

Researcher: Darius Houle | 2025

Weaponizing image scaling against production AI systems

Exploit image scaling vulnerabilities on Google Gemini, Vertex AI Studio, and Genspark. Introduces Anamorpher, an open-source tool.

Researchers: Kikimora Morozova, Suha Sabi Hussain | 2025

Prompt injection engineering for attackers: Exploiting GitHub Copilot

Designed and implemented a prompt injection exploit targeting GitHub's Copilot Agent.

Researcher: Kevin Higgs | 2025

Memory corruption in NVIDIA Triton Inference Server

CVE-2025-23310, CVE-2025-23311 - Two remotely accessible memory corruption bugs in NVIDIA's Triton Inference Server.

Researcher: Will Vandevanter | 2025

Exploiting zero days in abandoned hardware

Successfully exploited two discontinued network devices (Netgear WGR614v9, BitDefender Box V1) at DistrictCon's inaugural Junkyard competition.

Researchers: Alan Cao, Will Tan | 2025

Cryptography bugs in elliptic library

CVE-2024-48948, CVE-2024-48949, CVE-2024-48950, CVE-2024-48951, CVE-2024-48952 - Vulnerabilities in the elliptic JavaScript library that could allow signature forgery.

Researcher: Markus Schiffermuller | 2024

MCP plaintext API key storage

Many examples of MCP software store long-term API keys for third-party services in plaintext on the local filesystem with insecure, world-readable permissions.

Researchers: Cliff Smith, Suha Hussain, Will Vandevanter | 2025

MCP ANSI escape sequence attacks

Attacks using ANSI terminal code escape sequences to hide malicious instructions to the LLM, leveraging the line jumping vulnerability.

Researchers: Cliff Smith, Suha Hussain, Will Vandevanter | 2025

MCP Line Jumping vulnerability

MCP's 'line jumping' vulnerability lets malicious servers inject prompts through tool descriptions to manipulate AI behavior before tools are ever invoked.

Researchers: Cliff Smith, Suha Hussain, Will Vandevanter | 2025

User to root privilege escalation from an integer overflow in libinfo

CVE-2025-24195, CVE-2025-31222, CVE-2025-30440 - Integer overflow vulnerability in macOS libinfo allowing privilege escalation.

Researcher: Paweł Płatek | 2025

Crash due to uncontrolled recursion in Well-KnownText

CVE-2024-52981 - Denial of service vulnerability in Elastic caused by uncontrolled recursion.

Researchers: Alexis Challande, Brad Swain | 2024

Crash due to uncontrolled recursion in innerForbidCircularReferences

CVE-2024-52980 - Denial of service vulnerability in Elastic caused by uncontrolled recursion.

Researchers: Alexis Challande, Brad Swain | 2024

Crash due to uncontrolled recursion in Wire

CVE-2024-58103 - Denial of service vulnerability in Wire caused by uncontrolled recursion.

Researchers: Alexis Challande, Brad Swain | 2024

Buttercup: Autonomously Finding and Fixing Bugs at Scale

Buttercup's autonomous bug finding and fixing capabilities in open-source software.

Speaker: Ronald Eytchison | Presentation

Buttercup and DARPA's AI Cyber Challenge (Ringzero)

Overview of Buttercup's participation in DARPA's AIxCC presented at Ringzero.

Speakers: Henrik Brodin & Ronald Eytchison | Presentation

Buttercup and DARPA's AI Cyber Challenge (CSAW)

CSAW presentation on Buttercup's approach to DARPA's AI Cyber Challenge.

Speaker: Ronald Eytchison | Presentation

Buttercup: The Future of Trail of Bits's Solution

Presentation on Buttercup's future at Griffiss Institute.

Speaker: Trent Brunson | Presentation

Our experience competing in the AI Cyber Challenge

Detailed account of Trail of Bits' experience competing in DARPA's AIxCC.

Speaker: Michael Brown et al. | Presentation

How to Become a Smart Contract Auditor

Educational presentation on becoming a smart contract auditor, presented at EthCC[8].

Speaker: nisedo | Presentation

Slither's Model Context Protocol

Slither-MCP integration for augmenting LLMs with static analysis.

Speaker: Ben Samuels | Presentation

Constant-Time Coding Support in LLVM

Constant-time coding support in LLVM to protect cryptographic code.

Speaker: Julius Alexandre | Presentation

One, Two, TEE: Trust in Numbers Meets Hardware Security

Exploration of Trusted Execution Environments and hardware security.

Speaker: Paul Bottinelli | Presentation

Repeatable Benchmarking: OpenSearch vs Elasticsearch

Technical exploration comparing OpenSearch and Elasticsearch performance.

Speaker: Evan Downing | Presentation

Indirect Prompt Injection: Architectural Testing Approaches

Deep dive into testing approaches for indirect prompt injection vulnerabilities.

Speaker: Will Vandevanter | Presentation

Attestations: a new generation of signatures on PyPI

PyPI attestations and supply chain security improvements.

Speaker: William Woodruff | Presentation

MCP Security Deep Dive: From Attacks to Defense

Comprehensive webinar covering MCP vulnerabilities and defense strategies.

Speakers: Keith Hoodlet, Cliff Smith, Vineeth Sai Narajala, Manish Bhatt | Webinar

Security Audits: Best Practices with Trail of Bits

Webinar on security audit best practices and methodologies.

Speakers: Chris Dahlheimer, Lindsay Rakowski, Vanessa Gennarelli | Webinar

Top TEE bugs you should fix before your audit

Common TEE vulnerabilities and how to address them before security audits.

Speakers: Tjaden Hess, Paul Bottinelli, Jules Drean | Webinar

After Wiretap and Battering RAM: What Changes for TEE-Based Blockchain Infrastructure

Implications of recent TEE attacks for blockchain infrastructure security.

Speakers: Tjaden Hess, Andy Campbell | Webinar

Building secure end-to-end encrypted systems

Best practices for building and threat modeling end-to-end encrypted systems.

Speakers: Marc Ilunga, Fredrik Dahlgren | Webinar

Risky Biz: AI Prompt Injections

Discussion on AI prompt injection vulnerabilities and security implications.

Guest: Keith Hoodlet | Podcast

Zero Signal: AI Security

Deep dive into AI security challenges and solutions.

Guest: Keith Hoodlet | Podcast

Unsupervised Learning: AIxCC

Discussion about Trail of Bits' participation in DARPA's AI Cyber Challenge.

Guest: Michael Brown | Podcast

Security Weekly #342: NVIDIA Vulnerability Disclosure

Discussion on NVIDIA Triton memory corruption vulnerability discovery.

Guest: Will Vandevanter | Podcast

CTF Radiooo 01E: AIxCC

Discussing Trail of Bits' AI Cyber Challenge experience.

Guests: Michael Brown & Evan Downing | Podcast

Click Here Show: Zoom Remote Control Attacks

Discussion on ELUSIVE COMET Zoom remote control attack mitigation.

Guest: Dan Guido | Podcast

Security Weekly #336: Fuzzing Barcodes

Technical discussion on barcode fuzzing techniques.

Guest: Artur Cygan | Podcast

Protect AI: MCP Security

Exploring Model Context Protocol security vulnerabilities and protections.

Guest: Keith Hoodlet | Podcast

MLSecOps: AI/ML Security

Comprehensive discussion on AI/ML security best practices.

Guest: Keith Hoodlet | Podcast

Risky Biz 786: Cryptography & Blockchain

Discussion on cryptography and blockchain security topics.

Guest: Tjaden Hess | Podcast

Security Weekly #323: GenAI in AppSec

Exploring the role of Generative AI in application security.

Guest: Keith Hoodlet | Podcast

Xyonix: AI/ML Security

In-depth conversation on AI/ML security challenges.

Guest: Keith Hoodlet | Podcast

Google Go Cryptographic Libraries

Security review of Google's Go cryptographic implementations (12 person-weeks).

Client: Google | March 2025

Discord E2EE WebAssembly

Security review of Discord end-to-end encryption WebAssembly implementation.

Client: Discord | June 2025

Meta WhatsApp Private Processing

Security review of WhatsApp's private processing features.

Client: Meta | August 2025

X XChat

Security review of X XChat messaging platform.

Client: X | October 2025

Franklin Templeton BenjiSwap Contract

Security review of Franklin Templeton BenjiSwap smart contract.

Client: Franklin Templeton | October 2025

Franklin Templeton Benji Contracts

Security review of Franklin Templeton Benji smart contracts.

Client: Franklin Templeton | February 2025

Gemini Smart Wallet

Security review of Gemini Smart Wallet.

Client: Gemini | August 2025

Gemini Smart Wallet (Letter of Attestation)

Letter of attestation for Gemini Smart Wallet.

Client: Gemini | August 2025

Google Longfellow

Security review of Google Longfellow cryptographic implementation (4.6 person-weeks).

Client: Google | August 2025

Scopely Monopoly Go!

Letter of attestation for Scopely Monopoly Go! (2 person-weeks).

Client: Scopely | January 2025

Arbitrum Quorum Changes

Security review of Arbitrum quorum changes.

Client: Offchain Labs | December 2025

Arbitrum ArbOS 50 and 51 (Fusaka)

Security review of Arbitrum's ArbOS 50 and 51 Fusaka upgrade.

Client: Offchain Labs | December 2025

Arbitrum Chains Genesis File Generator

Security review of Arbitrum chains genesis file generator (1.6 person-weeks).

Client: Offchain Labs | December 2025

Arbitrum Upgrade Executor

Security review of Arbitrum upgrade executor mechanism (0.2 person-weeks).

Client: Offchain Labs | July 2025

SetCoreGovernorQuorumAction

Security review of SetCoreGovernorQuorumAction governance mechanism (1.2 person-weeks).

Client: Offchain Labs | June 2025

Arbitrum Mint/Burn Precompile

Security review of Arbitrum mint/burn precompile (1.8 person-weeks).

Client: Offchain Labs | June 2025

Arbitrum Block Hash Pusher

Security review of Arbitrum block hash pusher mechanism (1.8 person-weeks).

Client: Offchain Labs | June 2025

ArbOS 40 Nitro

Security review of ArbOS 40 Nitro upgrade (6 person-weeks).

Client: Offchain Labs | May 2025

Reward Distributor Fixes

Security review of reward distributor fixes (0.8 person-weeks).

Client: Offchain Labs | April 2025

Sequencer Liveness

Security review of Arbitrum sequencer liveness (3 person-weeks).

Client: Offchain Labs | March 2025

Custom Fee Bridge & EIP-7702

Security review of custom fee bridge and EIP-7702 (1 person-week).

Client: Offchain Labs | March 2025

Geth 14.4 Pectra

Security review of Geth 14.4 Pectra upgrade (0.8 person-weeks).

Client: Offchain Labs | March 2025

Custom Fee Exchange Rate

Security review of custom fee exchange rate mechanism (1 person-week).

Client: Offchain Labs | March 2025

Security Council Rotation

Security review of security council rotation mechanism (1.6 person-weeks).

Client: Offchain Labs | March 2025

DisableGateway USDT

Security review of DisableGateway action for USDT (0.4 person-weeks).

Client: Offchain Labs | March 2025

Zama

Security review of Zama fully homomorphic encryption implementation.

Client: Zama | October 2025

Edera Runtime Container

Security review of Edera container runtime.

Client: Edera | October 2025

VeChainThor Hayabusa Upgrade

Security review of VeChain VeChainThor Hayabusa upgrade.

Client: VeChain | October 2025

Radius Technology EVMAuth

Security review of Radius Technology EVMAuth.

Client: Radius Technology | October 2025

DFINITY Orbit

Security review of DFINITY Orbit.

Client: DFINITY | September 2025

Shape Buyback Contract

Security review of Shape Network buyback smart contract.

Client: Shape Network | September 2025

Ava Labs AvalancheGo

Security review of Ava Labs AvalancheGo.

Client: Ava Labs | August 2025

Starkware StarkEx Diff Review

Security diff review of Starkware StarkEx.

Client: Starkware | August 2025

EVAA Finance

Security review of EVAA Finance lending protocol on TON (8.6 person-weeks).

Client: EVAA Finance | 2025

Swap Coffee TON DEX

Security review of Swap Coffee decentralized exchange on TON (6 person-weeks).

Client: Swap Coffee | 2025

FIVA Yield Protocol

Security review of FIVA yield protocol on TON (6 person-weeks).

Client: FIVA | 2025

FIVA Evaa Integration

Security review of FIVA integration with Evaa protocol (6 person-weeks).

Client: FIVA | 2025

Whales Holders

Security review of Whales Holders protocol on TON (4 person-weeks).

Client: Whales | 2025

Whales Nominators

Security review of Whales Nominators staking mechanism (4 person-weeks).

Client: Whales | 2025

STON.fi DEX V2

Security review of STON.fi DEX V2 on TON blockchain (8 person-weeks).

Client: STON.fi | January 2025

Tact Compiler

Security review of Tact compiler for TON smart contracts (8 person-weeks).

Client: TON Studio | January 2025

Scroll Feynman Upgrade

Security review of Scroll Feynman upgrade smart contract changes (1 person-week).

Client: Scroll | July 2025

Scroll Euclid Phase 2

Security review of Scroll zkEVM Euclid upgrade phase 2 (4 person-weeks).

Client: Scroll | April 2025

Scroll Euclid Phase 1

Security review of Scroll zkEVM Euclid upgrade phase 1 (3 person-weeks).

Client: Scroll | April 2025

Reserve Protocol Solidity 4.0.0

Security review of Reserve Protocol Solidity 4.0.0 (3.6 person-weeks).

Client: Reserve Protocol | June 2025

Reserve Protocol Solana DTFs

Security review of Reserve Protocol Solana DTFs (2 person-weeks).

Client: Reserve Protocol | April 2025

Reserve Folio Solidity Contracts

Security review of Reserve Folio Solidity-based contracts (2 person-weeks).

Client: Reserve Protocol | April 2025

DFINITY Oisy

Security review of DFINITY Oisy wallet (4 person-weeks).

Client: DFINITY | September 2025

Open Quantum Safe liboqs

Post-quantum cryptography library security review (5 person-weeks).

Client: Open Quantum Safe | April 2025

Zkonduit EZKL

Security review of EZKL zero-knowledge proofs for ML (11 person-weeks).

Client: Zkonduit | March 2025

CAP Labs Covered Agent Protocol

Security review of CAP Labs' covered agent protocol for DeFi.

Client: CAP Labs | May 2025

Everstake Ethereum Staking Protocol

Security review of Everstake's Ethereum staking protocol.

Client: Everstake | 2025

Bacon Labs Bunni V2

Security review of Bunni V2 liquidity management protocol.

Client: Bacon Labs | January 2025

Shape Token Contract

Security review of Shape Network token smart contract.

Client: Shape Network | May 2025

Fabric Labs Zipper Protocol

Security review of Fabric Labs Zipper Protocol.

Client: Fabric Labs | May 2025

Lagrange LAToken

Security review of Lagrange LAToken.

Client: Lagrange | April 2025

Serai DEX

Security review of Serai decentralized exchange.

Client: Serai | April 2025

Otim Smart Wallet

Security review of Otim Smart Wallet.

Client: Otim | March 2025

NATS Server

Security review of NATS messaging server.

Client: NATS/OSTIF | February 2025

Automata

Security review of Automata DCAP attestation and on-chain PCCS.

Client: Automata | February 2025

zkVerify

Security review of zkVerify blockchain.

Client: zkVerify Foundation | February 2025

ZetaChain Bitcoin Inscriptions

Security review of ZetaChain Bitcoin inscriptions.

Client: ZetaChain | January 2025

ZetaChain Solana Gateway

Security review of ZetaChain Solana gateway.

Client: ZetaChain | January 2025

Parabol Smart Contracts Updates

Security review of Parabol Labs protocol contract updates.

Client: Parabol Labs | January 2025

BeethovenX Sonic Staking

Security review of BeethovenX Sonic staking.

Client: BeethovenX | January 2025

Shape Gasback

Security review of Shape Gasback mechanism.

Client: Shape Network | January 2025

Stay Updated with Trail of Bits

Subscribe to our newsletter for the latest security research, tools, and insights delivered to your inbox

What's Next?

We're launching a bold new digital experience

Coming Soon
Trail of Bits Website Refresh Preview

A Fresh New Look

Our website is getting a complete makeover with modern design, enhanced navigation, and an even better user experience. Stay tuned for the big reveal in 2026.