Securing Prove Function Execution
To secure the proof function execution, the proof function must be carefully written to make sure all required contraints will make it circuits. It is also strongly recommended to have the proof function reviewed and audited by security experts.
Last updated
Was this helpful?