Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

EPIC: Provider assumption of trusted consumer too strong #754

Closed
6 tasks done
mpoke opened this issue Mar 6, 2023 · 1 comment
Closed
6 tasks done

EPIC: Provider assumption of trusted consumer too strong #754

mpoke opened this issue Mar 6, 2023 · 1 comment
Assignees
Labels
admin: key-result A key result (in the context of OKRs)

Comments

@mpoke
Copy link
Contributor

mpoke commented Mar 6, 2023

Problem

Currently, the provider assumes that the consumers are not malicious. Although the assumption is realistic for every consumer validator set (i.e., Replicated Security), the consumer may have malicious code. Thus, this assumption adds high requirements for the auditing process of consumer chains.

Closing criteria

The assumption of trusted consumer is dropped or relaxed.

Tasks

  1. type: feature-request
    shaspitz
  2. ccv-core type: feature-request
  3. S: KTLO good first issue type: bug
    mpoke
  4. S: KTLO type: bug
  5. S: NewThings question spec
  6. S: NewThings other: decayed type: feature-request
@mpoke mpoke added the admin: key-result A key result (in the context of OKRs) label Mar 6, 2023
@mpoke mpoke assigned glnro and sainoe Mar 8, 2023
@mpoke
Copy link
Contributor Author

mpoke commented Mar 9, 2023

Replaced by #732 and #761

@mpoke mpoke closed this as completed Mar 9, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
admin: key-result A key result (in the context of OKRs)
Projects
Status: ✅ Done
Development

No branches or pull requests

3 participants