Difference between revisions of "Third-party security audits"

From Internet Computer Wiki
Jump to: navigation, search
Line 27: Line 27:
  
 
Date: March 11, 2022
 
Date: March 11, 2022
 +
 
Report & Discussion: [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits]
 
Report & Discussion: [https://forum.dfinity.org/t/internet-computer-consensus-security-assessment-by-trail-of-bits-third-party-security-audit-2/11453 "Internet Computer Consensus: Security Assessment" by Trail of Bits]
  

Revision as of 02:30, 22 June 2022

"IC Assessment" by Trail of Bits

Report & Discussion

Date: January 4, 2022

Report Discussion: "IC Assessment" by Trail of Bits

Areas of the code which were audited:

  • Internet Computer Interfaces
  • Consensus Layer
  • Network Nervous System
  • Ledger Canister
  • Governance Canister
  • Registry Canister
  • Cycles Minting Canister
  • Genesis Token Canister
  • Cryptography libraries
  • Execution Environment
  • P2P Layer
  • Third Party Dependencies
  • Hardware Wallet

"Internet Computer Consensus: Security Assessment" by Trail of Bits

Report & Discussion

Date: March 11, 2022

Report & Discussion: "Internet Computer Consensus: Security Assessment" by Trail of Bits

Areas of the code which were audited:

  • Consensus Layer


IC "Threshold ECDSA Cryptography Review" by NCC Group

Report & Discussion

Date: June 16, 2022 Report & Discussion: IC "Threshold ECDSA Cryptography Review" by NCC Group

Areas of the code which were audited:

  • Threshold ECDSA