Difference between revisions of "Third-party security audits"
From Internet Computer Wiki
Diego.prats (talk | contribs) |
Diego.prats (talk | contribs) |
||
Line 1: | Line 1: | ||
− | |||
− | |||
− | |||
− | |||
− | |||
− | |||
== "IC Assessment" by Trail of Bits == | == "IC Assessment" by Trail of Bits == | ||
Revision as of 23:02, 21 June 2022
"IC Assessment" by Trail of Bits
Report & Discussion
Date: January 4, 2022 Report Discussion: "IC Assessment" by Trail of Bits
Areas of the code which were audited:
- Internet Computer Interfaces
- Consensus Layer
- Network Nervous System
- Ledger Canister
- Governance Canister
- Registry Canister
- Cycles Minting Canister
- Genesis Token Canister
- Cryptography libraries
- Execution Environment
- P2P Layer
- Third Party Dependencies
- Hardware Wallet
"Internet Computer Consensus: Security Assessment" by Trail of Bits
Report & Discussion
Date: March 11, 2022 Report & Discussion: "Internet Computer Consensus: Security Assessment" by Trail of Bits
Areas of the code which were audited:
- Consensus Layer
IC "Threshold ECDSA Cryptography Review" by NCC Group
Report & Discussion
Date: June 16, 2022 Report & Discussion: IC "Threshold ECDSA Cryptography Review" by NCC Group
Areas of the code which were audited:
- Threshold ECDSA