Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Audit] Identify the scope #1422

Open
victhorbi opened this issue Oct 21, 2024 · 2 comments
Open

[Audit] Identify the scope #1422

victhorbi opened this issue Oct 21, 2024 · 2 comments

Comments

@victhorbi
Copy link
Collaborator

Context
As the VeChain-SDK is a public good, the code is open for anyone to review. VeChain Foundation wants also to get the codebase reviewed by a recognised third-party professional auditor.

Description
Since the SDK is vast, giving the auditor the whole repo can be dispersive and can take a lot of time. The ask is to go through the packages and tag the portions with a risk level.

Acceptance criteria
Produce a spreadsheet where each raw represent a part of the sdk, define for each entry a risk level (LOWEST, LOW, MEDIUM, HIGH, HIGHEST) to later define prioritise the code to audit.

@leszek-vechain
Copy link
Collaborator

So I was looking into the repository today and couple of things come to my mind:

I suppose based on this we can try to identify code which is more susceptible to abuse

@freemanzMrojo
Copy link
Member

Hi guys, after discussing with @lucanicoladebiasi , we thought that by refactoring the network package we could:

  1. Fix any security issues for that package since the code will become different
  2. Make it better and remove circular dependencies

To better define the scope of this refactor, we have decided to start "small" by refactoring the ThorClient so we can have a better idea of the follow-up steps in this regard. With that in mind I have created this ticket #1450.

Any comments/questions just let us know, thanks.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment