Third-party security audits

From Internet Computer Wiki
Jump to: navigation, search

Goal

In order to increase the security of the IC, the DFINITY foundation has on-going third-party audits of the IC.

Third party audits and reviews

"IC Assessment" by Trail of Bits

Report & Discussion

"IC Assessment" by Trail of Bits on January 4, 2022

Areas of the code which were audited:

  • Internet Computer Interfaces
  • Consensus Layer
  • Network Nervous System
  • Ledger Canister
  • Governance Canister
  • Registry Canister
  • Cycles Minting Canister
  • Genesis Token Canister
  • Cryptography libraries
  • Execution Environment
  • P2P Layer
  • Third Party Dependencies
  • Hardware Wallet


2. "Internet Computer Consensus: Security Assessment" by Trail of Bits on March 11, 2022

3. IC "Threshold ECDSA Cryptography Review" by NCC Group on June 16, 2022