Kroma
GithubCommunity
  • Introduction
    • Overview
    • KRO Tokenomics
      • Token Allocation
      • Token Distribution
      • Token Utilities
      • Airdrops
        • Initial Airdrop
    • Official Links
  • BUILDERS
    • Developers
      • Contract Deployment Tutorial
        • Using Foundry
        • Using Remix IDE
        • Using Hardhat
      • JSON-RPC API
      • Oracles
    • Node Operators
      • Kroma MPT Migration Guide
      • Running a Full Node
      • Running a Kroma v2 Validator Node
        • How to Migrate Your Validator to KRO-based Validator System
      • How to Sync Blocks Using a Snapshot
      • FAQ
      • [Deprecated] Running a Kroma v1 Validator Node
        • How to Check and Claim the Validator Reward
    • Network Information
    • Protocol Contracts
    • Testnet
      • Setup
      • Faucet
      • Bridge
      • Contract Addresses
  • USERS
    • Wallet Configuration
    • Bridge
    • Block Explorer
    • How to Swap legacy USDC to upgradable USDC
  • Governance
    • Kroma Security Council
  • Kroma Guardian House
    • Overview
    • Philosophy
    • KRO & KGH NFT Staking
      • Validator Boosting by KGH NFT
      • How to Get KRO
      • FAQ
    • KGH NFT Migration & KYC
      • KGH NFT Migration
      • How to Complete KYC with Argos
    • KGH NFT Sales (Ended)
      • KGH Utilities
      • Referral Program: Expand Your Impact
      • Estimated Reward Value
    • Notice
  • Resources
    • Security
    • Brand Kit
    • FAQs
    • Glossary
Powered by GitBook
On this page

Was this helpful?

  1. Resources

Security

PreviousNoticeNextBrand Kit

Last updated 5 months ago

Was this helpful?

Kroma places a high emphasis on security.

Our ultimate goal is to transaition from optimistic rollups to zero-knowledge rollups. Currently, Kroma incorporates zero-knowledge fault proofs implemented using zkEVM within the OP Stack.

Participants in the Kroma network consist of one sequencer and validators. The sequencer submits L2 transaction batches to Ethereum, while validators submit and verify the L2 outputs on Ethereum. Specifically, Kroma is working on a permissionless validation system allowing any user to participate in our network as a validator.

With our permissionless system and our emphasis on security, we are conducting continuous internal security audits in order to ensure the safety of the assets in Kroma. Additionally, external audits from third-party organizations are also being carried out to further enhance the security of the Kroma network.

The following is the initial security audit report received from , with a primary focus on the decentralized challenge system.

Below is the security audit report for Kroma zkTrie, an enhanced version of Scroll's zkTrie, received from .

Below is the security audit report for Kroma Validator System V2, a new Validator System based on Kroma's native token(KRO), received from .

Last but not least, below is the security audit report for Kroma's native token contract, received from .

ChainLight
[ChainLight] Kroma Security Audit v1.0.pdf
ChainLight
[ChainLight] Kroma ZK Trie v1.21.pdf
ChainLight
[ChainLight] Kroma Validator System v2 Security Audit.pdf
Certik
[Certik] Kroma Token Contract.pdf