Audits & Security Partners
Last updated
Last updated
Silk and its underlying protocols (Mishti Network and Zeronym) been audited. However, equally important, Silk incorporates an advanced threat model and extensively employs security consultants in the design and implementation of features before audits are even done. Additionally, we have found and responsibly disclosed numerous bugs in other wallets to help secure their user funds. This had led to Silk being a leader in wallet security.
Silk views responsible security as a commitment to second lines of defense: rather than solely reducing the chance of bugs occurring, we focus substantial effort on limiting the scope of what a bug in any component can do. This is accomplished via techniques such as 2PC and resource isolation, along with zero trust and multifactor authorization (not just authentication).
Silk or its key management protocols and features developed by Holonym such as Mishti Network and Zeronym, have been audited by:
Cure53
Hexens
Least Authority
Halborn
Silk architecture was designed with consulting from
Anderson Software
Distrust
to create its architecture and development pipelines with security first.
Wallet security should not stop at audits, To learn more about the Silk security model, see the next section: