RootstockLabs has created the bug bounty program to reward researchers that submit valid vulnerabilities to improve the RootstockLabs platforms security.
5 documentos etiquetados con "security"
Learn about the security process for the Liquidity Provider Server in the Flyover protocol, including vulnerability reporting, disclosure policies, and public keys.
Achieving security in a Powpegged sidechain using proofs of payment
Essential security practices for DeFi: reentrancy, access control, upgradeability, and more.
All the different ways that you can verify RSKj: Release signing key, fingerprint of the public key, SHA256SUMS.asc, binary dependencies, secure environment script