New blog: How do you build a secure zkVM application—and how do you audit one? (Part III in our zkVM security series).

We walk through a concrete example using @RiscZero, and show the security considerations that matter in real-world ZK app development.

Thread 🧵

1/6