Delendum provides zero-knowledge proof research and development services. Mentors include...

Zellic operates a dedicated zero-knowledge security team that combines distinguished expertise in advanced cryptography, vulnerability research, and competitive hacking. Their ZK specialists review zero-knowledge circuits implemented in Circom and Halo2 for zkEVMs, zkVMs, privacy protocols, identity systems, and cross-chain interoperability infrastructure.
Zellic's cryptographers specialize in identifying security vulnerabilities unique to zero-knowledge systems:
Underconstrained Circuits: Expert at probing areas where circuits might be underconstrained, allowing invalid proofs to be generated. This is one of the most subtle and critical vulnerability classes in ZK systems.
Algebraic Attacks: Deep analysis of hash functions used in ZK systems (Poseidon, Pedersen, etc.) for potential algebraic attacks that could compromise soundness or privacy guarantees.
Constraint System Completeness: Thorough review of constraint systems to ensure all security-critical properties are properly enforced and no edge cases allow constraint violations.
Soundness & Completeness: Mathematical verification that ZK circuits correctly enforce their intended properties—that valid statements can be proven (completeness) and invalid statements cannot (soundness).
Circom Circuits: Extensive experience reviewing Circom implementations for various ZK applications including zkSNARKs and Groth16 proving systems.
Halo2 Circuits: Specialized expertise in Halo2's more flexible but complex constraint system, including custom gates and lookup arguments.
Application Domains: Layer 2 zkEVMs (Scroll zkEVM comprehensive review), zero-knowledge coprocessors (Axiom ZK circuits and smart contracts), privacy primitives (Nocturne privacy protocol), zk-Bridges (Polyhedra cross-chain infrastructure), and identity systems with privacy-preserving authentication.
Zellic publishes original ZK security research demonstrating their deep expertise including deep dives into SNARK and STARK complexity, reviews of algebraic attacks on hash functions, mathematical breakdowns of production ZK implementations like Tornado Cash, and introduction of Polocolo—a novel ZK-friendly hash function for PLONK with lookup. This research contribution demonstrates Zellic's position at the cutting edge of zero-knowledge cryptography and their ability to not just audit existing systems but advance the field.
Share your experience working with Zellic on Zero-Knowledge Circuit Security Reviews by leaving a review.
Leave a ReviewV12 is Zellic's automated security analysis tool that finds critical bugs consistently...
Zellic provides protocol-level security engineering for blockchain Layer 1 protocols,...
Zellic provides industry-leading smart contract security audits across all major...
Zellic offers advanced formal verification services that provide mathematical certainty...
Delendum provides zero-knowledge proof research and development services. Mentors include...
Heliax provides privacy and blockchain protocol development services as the team building...
LambdaClass provides deep-tech Ethereum and zero-knowledge proof development services,...
p0x labs provides ZK privacy protocol development. Builders of Manta Network. $25M funded...
Global ZKP-focused accelerator with $20M committed. zkTech Camp incubation program....
Supranational provides hardware-accelerated cryptographic infrastructure services for...