Skip to content

Commit a3a4008

Browse files
docs: align mainnet security policy and tokenomics runway notes.
Document no-budget launch security posture with evidence-driven gates, disclosure/triage requirements, and updated mainnet roadmap language. Add tokenomics supply-runway clarifications for docs and website handoff. Made-with: Cursor
1 parent 1625f49 commit a3a4008

5 files changed

Lines changed: 58 additions & 12 deletions

File tree

docs/mainnet-roadmap.md

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Canonical tracking:
2727
- **Epic**: `#262`
2828
- **Threat model**: `#271`
2929
- **Adversarial tests**: `#272`
30-
- **External review scope/remediation**: `#273`
30+
- **Security review scope/remediation + disclosure policy**: `#273`
3131

3232
### 3) Reliability/performance gate
3333

@@ -62,7 +62,8 @@ Canonical tracking:
6262

6363
## Additions I recommend (not explicitly in the list, but mainnet-critical)
6464

65-
- **Security review/audit scope** is tracked in `#273`.
65+
- **No-budget security model**: launch can proceed without paid audit if reproducible adversarial and reliability evidence gates are complete.
66+
- **Security review/disclosure scope** is tracked in `#273` (community reporting + triage workflow).
6667
- **Monitoring/alerting** is tracked in `#280`.
6768
- **Genesis / launch runbook** is tracked in `#279`.
6869

docs/security-external-review-scope.md

Lines changed: 28 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
1-
# External security review scope and remediation checklist (mainnet)
1+
# Security review scope and remediation checklist (mainnet)
22

3-
This document defines the minimum external security review package required for mainnet launch readiness.
3+
This document defines the minimum security review package for mainnet launch readiness under a no-budget launch model.
44

55
Tracking:
66

@@ -9,9 +9,18 @@ Tracking:
99

1010
## Objective
1111

12-
Define a clear, auditable external review scope and a deterministic remediation workflow so findings can be triaged, fixed, verified, and signed off before launch.
12+
Define a clear, auditable review scope and a deterministic remediation workflow so findings can be triaged, fixed, verified, and signed off before launch.
1313

14-
## In-scope components for external review
14+
## Launch model (explicit)
15+
16+
- Catalyst v1 launch does **not** require a paid third-party audit or paid penetration testing.
17+
- Launch readiness instead depends on:
18+
- reproducible adversarial evidence (`#272`)
19+
- reliability/chaos evidence (`#274`, `#275`)
20+
- documented residual-risk acceptance and operational controls
21+
- Post-launch, community-led review is explicitly encouraged and tracked through responsible disclosure workflow.
22+
23+
## In-scope components for security review
1524

1625
Reviewers should focus on code paths that can cause consensus safety failures, liveness failures, or critical asset compromise.
1726

@@ -96,7 +105,7 @@ Out-of-scope items can be tracked separately, but must not block launch-gate sig
96105

97106
## Required review deliverables
98107

99-
The external reviewer package must include:
108+
The review package should include (from internal testing and/or community reports):
100109

101110
1. Scope and methodology summary.
102111
2. Finding list with severity and exploit preconditions.
@@ -114,17 +123,29 @@ For each finding:
114123
4. Add/extend deterministic regression tests.
115124
5. Run relevant package tests and checks.
116125
6. Document behavior changes in `docs/` when externally visible.
117-
7. Request reviewer retest or internal adversarial confirmation.
126+
7. Request retest by reporter/reviewer where possible, or run internal adversarial confirmation.
118127
8. Mark as resolved only with evidence attached.
119128

120129
## Evidence requirements before closing `#273`
121130

122-
- reviewer scope document attached/linked
131+
- scope document attached/linked
123132
- findings table with statuses (open/fixed/accepted)
124133
- all Critical findings resolved
125134
- High findings resolved or explicitly accepted with mitigation notes
126135
- remediation commits and test evidence linked per finding
127136

137+
## Community disclosure and triage baseline
138+
139+
Before launch, define and publish:
140+
141+
- a security contact channel (for example: dedicated email or issue template)
142+
- a report intake template (impact, reproduction, affected version)
143+
- severity mapping (Critical/High/Medium/Low) and response expectations
144+
- a triage SLA target for first response and status updates
145+
- disclosure guidance (private reporting preferred before coordinated public disclosure)
146+
147+
After launch, continue publishing remediation evidence in-repo and maintain a public acknowledgement path for valid reports.
148+
128149
## Handoff to `#272`
129150

130151
Any finding that requires adversarial validation must be mapped into executable scenarios in `docs/adversarial-test-plan.md` and tracked in `#272`.

docs/security-threat-model.md

Lines changed: 12 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ It is the canonical input for:
66
- `#262` epic: security threat model and adversarial test gate
77
- `#271`: publish mainnet threat model and attack assumptions
88
- `#272`: adversarial test execution evidence
9-
- `#273`: external review scope and remediation checklist
9+
- `#273`: security review scope and remediation checklist
1010

1111
## Security goals
1212

@@ -84,7 +84,7 @@ It is the canonical input for:
8484
- min-peer maintenance with backoff/jitter
8585
- **Residual risk**:
8686
- stronger peer diversity and scoring still needed
87-
- **Verification path**: eclipse scenarios in `#272`; external review in `#273`.
87+
- **Verification path**: eclipse scenarios in `#272`; security review/triage process in `#273`.
8888

8989
### 5) Sybil pressure on economic eligibility
9090

@@ -121,6 +121,15 @@ It is the canonical input for:
121121
- endpoint-level shaping and stricter cost controls need continuous hardening
122122
- **Verification path**: abuse workloads in `#272`.
123123

124+
### 9) Vulnerability disclosure process failure
125+
126+
- **Impact**: valid findings are delayed, mishandled, or disclosed unsafely.
127+
- **Current controls**:
128+
- in-repo issue tracking and remediation evidence discipline
129+
- **Residual risk**:
130+
- disclosure channel/SLA policy must be explicitly documented for launch
131+
- **Verification path**: disclosure/triage workflow definition under `#273`.
132+
124133
## Residual risks accepted for v1 (explicit)
125134

126135
- Global internet-scale DDoS resistance is out of scope for protocol code alone.
@@ -133,6 +142,6 @@ To satisfy `#262` before launch:
133142

134143
1. Threat model and assumptions are published and reviewed (`#271`).
135144
2. Adversarial test plan is executed with reproducible evidence (`#272`).
136-
3. External review scope and remediation workflow are defined (`#273`).
145+
3. Security review scope and remediation workflow are defined (`#273`), including community disclosure/triage policy.
137146
4. Residual risks are explicitly accepted or mitigated with owners and timelines.
138147

docs/tokenomics-explainer-handoff.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -101,6 +101,10 @@ Yes. Eligible waiting workers receive a share of cycle rewards and can accrue fe
101101

102102
No. Fee credits are non-transferable and scoped to the same sender identity.
103103

104+
### Could Catalyst run out of tokens quickly?
105+
106+
No. At the v1 mint rate (`1 KAT` every `20s`), the theoretical numeric supply ceiling is extremely far out (about `11,699 years`, based on `u64` atom representation). In practice, this is a long-run runway rather than a near-term limit.
107+
104108
## Verification snippet for operators
105109

106110
Use this JSON-RPC call to display live tokenomics parameters:

docs/tokenomics-model.md

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,17 @@ Rationale:
3434
- avoids governance complexity of dynamic inflation in early network phases
3535
- aligns with fair-launch objective
3636

37+
## Supply runway (numeric limits)
38+
39+
With `1 KAT` minted per successful `20s` cycle and `1 KAT = 1_000_000_000 atoms`:
40+
41+
- theoretical max representable total supply is bounded by `u64` atoms:
42+
- `18_446_744_073_709_551_615 atoms`
43+
- `18_446_744_073.709551615 KAT`
44+
- at `1 KAT` per cycle, reaching that numeric ceiling would take about `11,699 years` of continuous successful cycles
45+
46+
This means v1 does not have a practical near-term risk of "running out" of representable supply.
47+
3748
## Reward model
3849

3950
Per successful cycle:

0 commit comments

Comments
 (0)