Noir Circuit Analysis
Write, compile, and analyze Noir ZK circuits for under-constrained signals, proof forgery vectors, and other vulnerabilities
Loading editor...
Loading editor...Upload Noir Circuit
Drop a .nr file here or click to browse
Editor Failed to Load
The analysis editor could not be initialized. Please try refreshing the page.
Supported Checks
Under-Constrained Values
Values returned from unconstrained fn without a corresponding assert() constraint. A malicious prover can set these to any value.
Missing Range Checks
Integer truncation via as u8 without range constraints, enabling value manipulation in the witness.
Oracle Trust Boundary
#[oracle] functions receive untrusted external data. Detects when oracle outputs are used without validation.
Public Input Exposure
Private data flowing to public outputs without hashing or commitment, potentially leaking secrets.
Sign in to analyze Noir circuits
Use the Sign In button in the navigation bar.