RootstockLabs has created the bug bounty program to reward researchers that submit valid vulnerabilities to improve the RootstockLabs platforms security.
6 docs tagged with "security"
A DeFi 101 catalog of token standards and security patterns to review before deploying to production on Rootstock.
Learn about the security process for the Liquidity Provider Server in the Flyover protocol, including vulnerability reporting, disclosure policies, and public keys.
Achieving security in a Powpegged sidechain using proofs of payment
Essential security practices for DeFi: reentrancy, access control, upgradeability, and more.
All the different ways that you can verify RSKj: Release signing key, fingerprint of the public key, SHA256SUMS.asc, binary dependencies, secure environment script