Securing Prove Function Execution

To secure the proof function execution, the proof function must be carefully written to make sure all required contraints will make it circuits. It is also strongly recommended to have the proof function reviewed and audited by security experts.

Last updated