BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InTalk to UsGet API Key
Verify It Yourself
SUPPLY CHAIN SECURITY

Your Antivirus Knows What's Bad.
ZK-Verify Knows What's Real.

H33-ZK-Verify uses zero-knowledge proofs to verify every binary, package, and firmware update against the publisher's cryptographic commitment — before it runs. Not signature scanning. Mathematical proof.

5
Proof streams
<100µs
Per verification
433
Repos GlassWorm hit
0
Trust required
Start Free Watch Demo Read the Docs
THE PROBLEM

Every check is looking for known-bad. Nobody proved it was known-good.

Your CI pipeline says green. Your antivirus says clean. But one package — buried four levels deep — was published 3 days ago by an attacker.

Today

npm install pulls 847 packages. Your CI pipeline says green. Your antivirus says clean. But one of those packages — buried four levels deep in the dependency tree — was published 3 days ago by an attacker. It has the right name, the right version, the right README. It passed every check. Because every check is looking for known-bad. Nobody proved it was known-good.

With ZK-Verify

Every package is verified against the publisher's SHA3-256 commitment before it installs. If the hash doesn't match, it doesn't run. Not because it's known-bad. Because it isn't known-good. GlassWorm compromised 433 repos. ZK-Verify would have caught every one.

MARCH 2026

The GlassWorm Attack — This Month

ACTIVE THREAT

433 Components. Invisible Code. Permanent C2.

In March 2026, GlassWorm compromised 433 components across GitHub, npm, VSCode, and OpenVSX. It used invisible Unicode characters to hide malicious code in plain sight. It stored its C2 server address on the Solana blockchain — permanent, public, impossible to take down. It stole AWS keys, SSH keys, Docker credentials, and installed a Chrome extension that logged every keystroke. The developer didn't install it. Their IDE's package manager did.

Every compromised package would have failed ZK-Verify's publisher commitment check. Hash mismatch on injection. Blocked before execution.

VERIFICATION ARCHITECTURE

5 Zero-Knowledge Proof Streams

Every install runs all 5 streams simultaneously. SHA3-256 commitments verify every claim. Zero-knowledge — nothing about your infrastructure is revealed.

STREAM 1
Binary Structure
Parses PE, ELF, and Mach-O headers. Computes structural hashes. Detects tampered executables even when the file looks legitimate and signatures appear valid.
STREAM 2
Code Signature
Verifies the full signing certificate chain against 15 known CAs. Catches expired certificates, self-signed binaries, and signer-vs-publisher mismatches.
STREAM 3
Publisher Commitment
Checks every package hash against the publisher's registry of known-good SHA3-256 commitments. Detects typosquatted names (lod4sh vs lodash) using Levenshtein distance analysis across 300 popular packages.
STREAM 4
Download Source
Verifies the download origin matches the publisher's known distribution domains. Catches rogue mirrors, typosquatted download sites, and HTTP (non-TLS) distribution.
STREAM 5
Firmware Payload
Verifies firmware images against OEM commitments for 24 manufacturers. Detects version rollback attacks, tampered update channels, and unsigned firmware.
COVERAGE

10 Supply Chain Attacks It Catches

From typosquatted packages to firmware rollbacks. Every technique that bypasses your CI pipeline — caught by proof.

01
Typosquatted Packages
lod4sh, reqeusts, colros
02
Dependency Confusion
internal name on public reg
03
Hijacked Maintainers
event-stream backdoor
04
Invisible Code Injection
GlassWorm Unicode
05
Tampered Binaries
modified .exe / .dmg
06
Unsigned Firmware
OTA without OEM sig
07
Rogue Update Channels
mirror swap / DNS hijack
08
Self-Signed Code
masquerading as legitimate
09
Version Rollback
downgrade to vuln version
10
Supply Chain C2
Solana dead drops
HOW IT WORKS

Three steps. Microseconds.

ZK-Verify sits in your install pipeline. Every package, binary, and firmware update is proven authentic before it runs.

Step 01 — Intercept
Catch Every Install
ZK-Verify sits in your install pipeline. npm install, pip install, apt-get, firmware OTA — every install passes through verification first.
Step 02 — Prove
5 Simultaneous Proof Streams
5 proof streams run in parallel. SHA3-256 commitments verify every claim against the publisher's known-good registry. Zero-knowledge — nothing about your infrastructure is revealed.
Step 03 — Block or Allow
Score 0–100
Authentic (85+) installs normally. Suspicious (50–85) flags for review. Tampered (below 50) is blocked before execution. One critical failure — hash mismatch, typosquat — collapses the score to zero instantly.
PERFORMANCE

Microsecond Verification

Every stream completes before the package finishes downloading. Cache hits from DashMap resolve in 80 nanoseconds.

25µs
Binary Structure
15µs
Code Signature
10µs
Publisher Check
8µs
Download Source
20µs
Firmware Payload
<100µs
Total / Check
0.08µs
Cache Hit
16
Publishers Preloaded
Preloaded publishers: Microsoft, Apple, Google, Amazon, Adobe, Mozilla, Canonical, Red Hat, Docker, HashiCorp, Cloudflare, JetBrains, Oracle, GitHub, npm Inc, PyPI
INCIDENT HISTORY

Real Incidents ZK-Verify Would Have Stopped

Every major supply chain attack in the last 5 years would have been blocked by a single check: does the hash match the publisher's commitment?

March 2026
GlassWorm
433 repos compromised across GitHub, npm, VSCode, and OpenVSX. Invisible Unicode characters hid malicious code. C2 address stored on Solana blockchain. Hash mismatch on every compromised package.
October 2021
ua-parser-js
7 million weekly downloads hijacked. Maintainer account compromised. Cryptominer and password stealer injected into three versions. Publisher hash changed overnight.
November 2018
event-stream
Targeted Copay Bitcoin wallet backdoor. Social engineering gave attacker maintainer access. Malicious dependency added. New maintainer, new code, new hash.
December 2022
PyTorch Nightly
Dependency confusion attack on torchtriton. Malicious package on PyPI matched internal name. Stole system information and SSH keys. Package name matched internal name on public registry.
January 2022
Colors.js
Maintainer intentionally corrupted the package with infinite loop. Broke thousands of projects including AWS CDK. Hash diverged from last known-good version.
PRICING

Simple, Usage-Based Pricing

Start free. Scale as your pipeline grows. Every tier includes SHA3-256 zero-knowledge commitments.

Tier Volume Price Includes
Free 1,000 checks/mo $0 Binary + publisher verification
Pro 50,000 checks/mo $49/mo All 5 streams + supply chain
Business 500,000 checks/mo $299/mo + firmware + priority + custom publishers
Enterprise Unlimited Custom + on-prem + dedicated registry + SLA
Per-check pricing at scale: $0.001 per verification

Pair With ZK-Trustless

ZK-Proven verifies your connections. ZK-Phish verifies your content. ZK-Verify verifies your code. Together as ZK-Trustless, they cover every attack surface — from the network layer to the content layer to the supply chain.

Bundle all three products for volume pricing
Learn about ZK-Trustless →
INTEGRATION

One API Call. Instant Verdict.

Verify any package, binary, or firmware update with a single request. Results in microseconds.

check-package.js
const result = await h33.verify.checkPackage({
  name: 'lod4sh',
  version: '4.17.21',
  registry: 'npm',
  hash: 'a1b2c3d4...'
});

// result.verdict = "TAMPERED"
// result.score = 0
// result.reasons = [
// "typosquat_of_lodash",
// "publisher_unknown",
// "hash_mismatch"
// ]

Your Antivirus Knows What's Bad.
ZK-Verify Knows What's Real.

1,000 free checks. No credit card.

Free tier includes binary + publisher verification. Upgrade for all 5 proof streams.