You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Context
As the VeChain-SDK is a public good, the code is open for anyone to review. VeChain Foundation wants also to get the codebase reviewed by a recognised third-party professional auditor.
Description
Since the SDK is vast, giving the auditor the whole repo can be dispersive and can take a lot of time. The ask is to go through the packages and tag the portions with a risk level.
Acceptance criteria
Produce a spreadsheet where each raw represent a part of the sdk, define for each entry a risk level (LOWEST, LOW, MEDIUM, HIGH, HIGHEST) to later define prioritise the code to audit.
The text was updated successfully, but these errors were encountered:
Hi guys, after discussing with @lucanicoladebiasi , we thought that by refactoring the network package we could:
Fix any security issues for that package since the code will become different
Make it better and remove circular dependencies
To better define the scope of this refactor, we have decided to start "small" by refactoring the ThorClient so we can have a better idea of the follow-up steps in this regard. With that in mind I have created this ticket #1450.
Context
As the VeChain-SDK is a public good, the code is open for anyone to review. VeChain Foundation wants also to get the codebase reviewed by a recognised third-party professional auditor.
Description
Since the SDK is vast, giving the auditor the whole repo can be dispersive and can take a lot of time. The ask is to go through the packages and tag the portions with a risk level.
Acceptance criteria
Produce a spreadsheet where each raw represent a part of the sdk, define for each entry a risk level (LOWEST, LOW, MEDIUM, HIGH, HIGHEST) to later define prioritise the code to audit.
The text was updated successfully, but these errors were encountered: