You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -45,7 +45,7 @@ The protocol is based on our [technical specification](https://docs.google.com/d
45
45
## Contributing
46
46
You are considering to contribute to our protocol? Awesome - please refer to our [Contribution Guidelines](./CONTRIBUTING.md) to find our about the processes we established to ensure highest quality within our codebase.
47
47
48
-
## Safety
48
+
## Security
49
49
Our [Security Policy](./SECURITY.md) provides details about our Security Guidelines, audits, and more. If you have discovered a potential security vulnerability within the Inverter Protocol, please report it to us by emailing [[email protected]](mailto:[email protected]).
Copy file name to clipboardExpand all lines: SECURITY.md
+10-8Lines changed: 10 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,24 +10,26 @@ If you discover a potential security vulnerability or issue within our smart con
10
10
11
11
We appreciate your efforts to disclose any security findings responsibly, and we are committed to collaborating with you to address the issue. Rest assured that you will be given proper credit for your contribution.
12
12
13
-
## Responsible Disclosure
14
-
15
-
Please practice responsible disclosure when reporting security issues. We kindly request that you do not publicly disclose or discuss the vulnerability until we have had sufficient time to investigate and address it. Privately disclosing the issue to us via email allows us to work on a fix without putting our users' funds at risk.
16
-
17
-
We understand the importance of acknowledging and rewarding security researchers for their efforts. Even though our bug bounty program is currently set up, we assure you that you will not be unpaid for your valuable contributions. We are committed to fairly compensating those who help us improve the security of our platform.
18
-
19
-
## Security Reviews and Audits
13
+
## Audits and Security Reviews
20
14
21
15
At Inverter Network, we prioritize the security of our smart contracts and follow a rigorous process of security reviews and audits:
22
16
23
17
* Per our development and security guidelines, we require an external review for each pull request (PR) that goes from the `dev` branch to the `main` branch in our repository. We have partnered with [Team Omega](https://teamomega.eth.limo) to conduct these security reviews directly in the PRs.
24
18
25
19
* Additionally, prior to major releases, we perform a full audit of any changed contracts via an external auditing company before the deployment. This ensures that our contracts undergo thorough scrutiny by professional auditors.
26
20
27
-
* Our version 1 has been audited by [0xMacro](https://0xmacro.com/). The audit report will be published here once it becomes public. Furthermore, our v1 is currently undergoing a public audit competition on [Hats Finance](https://hats.finance/), leveraging the expertise of the broader security community.
21
+
* Our version 1 has been audited by [0xMacro](https://0xmacro.com/) and underwent a public audit competition on [Hats Finance](https://hats.finance/), leveraging the expertise of the broader security community.
28
22
29
23
We are committed to transparency and will make the results of our security reviews and audits available to the public, fostering trust and confidence in the security of our platform.
30
24
25
+
**You can find all of our audit reports [here](./audits/).**
26
+
27
+
## Responsible Disclosure
28
+
29
+
Please practice responsible disclosure when reporting security issues. We kindly request that you do not publicly disclose or discuss the vulnerability until we have had sufficient time to investigate and address it. Privately disclosing the issue to us via email allows us to work on a fix without putting our users' funds at risk.
30
+
31
+
We understand the importance of acknowledging and rewarding security researchers for their efforts. Even though our bug bounty program is currently not set up, we assure you that you will not be unpaid for your valuable contributions. We are committed to fairly compensating those who help us improve the security of our platform.
32
+
31
33
## Security Guideline
32
34
33
35
At Inverter Network, we adhere to a comprehensive Security Guideline that outlines our best practices and approach to ensuring the security of our smart contracts. This guideline is a public document that we follow at all times. You can find our Security Guideline [here](https://docs.google.com/document/d/1CZgM9OEuibNrimbNeActve5n9ro3Ydu03OfSnZfRo_s).
At Inverter Network, we prioritize the security of our smart contracts and follow a rigorous process of security reviews and audits:
4
+
5
+
* Per our development and security guidelines, we require an external review for each pull request (PR) that goes from the `dev` branch to the `main` branch in our repository. We have partnered with [Team Omega](https://teamomega.eth.limo) to conduct these security reviews directly in the PRs.
* Additionally, prior to major releases, we perform a full audit of any changed contracts via an external auditing company before the deployment. This ensures that our contracts undergo thorough scrutiny by professional auditors.
9
+
10
+
* Our version 1 has been audited by [0xMacro](https://0xmacro.com/) and underwent a public audit competition on [Hats Finance](https://hats.finance/), leveraging the expertise of the broader security community.
We are committed to transparency and will make the results of our security reviews and audits available to the public, fostering trust and confidence in the security of our platform.
0 commit comments