Third-party security audits
From Internet Computer Wiki
Revision as of 22:59, 21 June 2022 by Diego.prats (talk | contribs) (→Third party audits and reviews)
Goal
In order to increase the security of the IC, the DFINITY foundation has on-going third-party audits of the IC.
Third party audits and reviews
"IC Assessment" by Trail of Bits
Report & Discussion
"IC Assessment" by Trail of Bits on January 4, 2022
Areas of the code which were audited:
- Internet Computer Interfaces
- Consensus Layer
- Network Nervous System
- Ledger Canister
- Governance Canister
- Registry Canister
- Cycles Minting Canister
- Genesis Token Canister
- Cryptography libraries
- Execution Environment
- P2P Layer
- Third Party Dependencies
- Hardware Wallet
2. "Internet Computer Consensus: Security Assessment" by Trail of Bits on March 11, 2022
3. IC "Threshold ECDSA Cryptography Review" by NCC Group on June 16, 2022