Batch GCD algorithm security audit

can i even do that ? is it like calling a dog … ‘here boy, here boy’ :sweat_smile: