You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/security-external-review-scope.md
+28-7Lines changed: 28 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
-
# External security review scope and remediation checklist (mainnet)
1
+
# Security review scope and remediation checklist (mainnet)
2
2
3
-
This document defines the minimum external security review package required for mainnet launch readiness.
3
+
This document defines the minimum security review package for mainnet launch readiness under a no-budget launch model.
4
4
5
5
Tracking:
6
6
@@ -9,9 +9,18 @@ Tracking:
9
9
10
10
## Objective
11
11
12
-
Define a clear, auditable external review scope and a deterministic remediation workflow so findings can be triaged, fixed, verified, and signed off before launch.
12
+
Define a clear, auditable review scope and a deterministic remediation workflow so findings can be triaged, fixed, verified, and signed off before launch.
13
13
14
-
## In-scope components for external review
14
+
## Launch model (explicit)
15
+
16
+
- Catalyst v1 launch does **not** require a paid third-party audit or paid penetration testing.
17
+
- Launch readiness instead depends on:
18
+
- reproducible adversarial evidence (`#272`)
19
+
- reliability/chaos evidence (`#274`, `#275`)
20
+
- documented residual-risk acceptance and operational controls
21
+
- Post-launch, community-led review is explicitly encouraged and tracked through responsible disclosure workflow.
22
+
23
+
## In-scope components for security review
15
24
16
25
Reviewers should focus on code paths that can cause consensus safety failures, liveness failures, or critical asset compromise.
17
26
@@ -96,7 +105,7 @@ Out-of-scope items can be tracked separately, but must not block launch-gate sig
96
105
97
106
## Required review deliverables
98
107
99
-
The external reviewer package must include:
108
+
The review package should include (from internal testing and/or community reports):
100
109
101
110
1. Scope and methodology summary.
102
111
2. Finding list with severity and exploit preconditions.
@@ -114,17 +123,29 @@ For each finding:
114
123
4. Add/extend deterministic regression tests.
115
124
5. Run relevant package tests and checks.
116
125
6. Document behavior changes in `docs/` when externally visible.
117
-
7. Request reviewer retest or internal adversarial confirmation.
126
+
7. Request retest by reporter/reviewer where possible, or run internal adversarial confirmation.
118
127
8. Mark as resolved only with evidence attached.
119
128
120
129
## Evidence requirements before closing `#273`
121
130
122
-
-reviewer scope document attached/linked
131
+
- scope document attached/linked
123
132
- findings table with statuses (open/fixed/accepted)
124
133
- all Critical findings resolved
125
134
- High findings resolved or explicitly accepted with mitigation notes
126
135
- remediation commits and test evidence linked per finding
127
136
137
+
## Community disclosure and triage baseline
138
+
139
+
Before launch, define and publish:
140
+
141
+
- a security contact channel (for example: dedicated email or issue template)
142
+
- a report intake template (impact, reproduction, affected version)
143
+
- severity mapping (Critical/High/Medium/Low) and response expectations
144
+
- a triage SLA target for first response and status updates
145
+
- disclosure guidance (private reporting preferred before coordinated public disclosure)
146
+
147
+
After launch, continue publishing remediation evidence in-repo and maintain a public acknowledgement path for valid reports.
148
+
128
149
## Handoff to `#272`
129
150
130
151
Any finding that requires adversarial validation must be mapped into executable scenarios in `docs/adversarial-test-plan.md` and tracked in `#272`.
Copy file name to clipboardExpand all lines: docs/tokenomics-explainer-handoff.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -101,6 +101,10 @@ Yes. Eligible waiting workers receive a share of cycle rewards and can accrue fe
101
101
102
102
No. Fee credits are non-transferable and scoped to the same sender identity.
103
103
104
+
### Could Catalyst run out of tokens quickly?
105
+
106
+
No. At the v1 mint rate (`1 KAT` every `20s`), the theoretical numeric supply ceiling is extremely far out (about `11,699 years`, based on `u64` atom representation). In practice, this is a long-run runway rather than a near-term limit.
107
+
104
108
## Verification snippet for operators
105
109
106
110
Use this JSON-RPC call to display live tokenomics parameters:
0 commit comments