-
Notifications
You must be signed in to change notification settings - Fork 6
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Project Roadmap #42
Comments
After discussions about the new proposed verification approach (#20), we have decided to amend milestone (2) to be more fine-grained. This is because instead of using the traditional approach for verification where we manually write specifications at the bytecode level, we are trying to develop a more automated approach where we generate the specifications at the bytecode level and prove that they are bisimilar to an abstract K specification. Milestone (3) becomes pushed back to Milestone (5), and Milestone (2) gets split into three steps, to reflect our better knowledge of the new process.
And finally (optional):
|
W3F Grants Program: Functional correctness verification of core Substrate modules for Polkadot
Introduction
The W3F is looking for auditors of the PR (Polkadot Runtime), focusing on the subset of Substrate modules used to implement Polkadot: https://medium.com/polkadot-network/apply-to-audit-polkadots-runtime-86c988ced31b.
This includes modules from the Substrate Runtime Module Library (SRML) and some Polkadot specific modules.
The modules are written in Rust, and are compiled to Wasm.
Of particular interest are authorization/code-execution attacks and denial-of-service attacks on the modules themselves (and thus on Substrate and potentially the network).
An audit at the Rust level will focus on high-level security properties of the code, but will not catch any build-time errors introduced or low-level functional correctness bugs. We propose formally verifying the generated Wasm code to guard against these bugs and to provide the security auditors with a complete specification of the behaviors of the generated Wasm. The verification artifacts (K specifications) can be integrated directly into Polkadot’s CI system so that on changes to behavior action must be taken to either fix the code or update the specification.
Deliverables:
Milestones:
The text was updated successfully, but these errors were encountered: