Audits & Security Partners

Silk and its underlying protocols (Mishti Network and Zeronym) been audited. However, equally important, Silk incorporates an advanced threat model and extensively employs security consultants in the design and implementation of features before audits are even done. Additionally, we have found and responsibly disclosed numerous bugs in other wallets to help secure their user funds. This had led to Silk being a leader in wallet security.

Silk views responsible security as a commitment to second lines of defense: rather than solely reducing the chance of bugs occurring, we focus substantial effort on limiting the scope of what a bug in any component can do. This is accomplished via techniques such as 2PC and resource isolation, along with zero trust and multifactor authorization (not just authentication).

Silk or its key management protocols and features developed by Holonym such as Mishti Network and Zeronym, have been audited by:

  • Cure53

  • Hexens

  • Least Authority

  • Halborn

Silk architecture was designed with consulting from

  • Anderson Software

  • Distrust

to create its architecture and development pipelines with security first.

But there's more than audits!

Wallet security should not stop at audits, To learn more about the Silk security model, see the next section:

Last updated