Security review process
A brief overview about the security review process, what to expect and how you can benefit from it.
graph TD;
A[1. Tell me about your project]-- Get a quote and<br>pre-review -->B[2. Preparation for kick-off];
B--Collaboration established-->C{3. Main security review};
C--Preliminary report-->D[4. Mitigation review];
D-. Further needs? .->E(Ongoing security consulting);
1. Tell me about your project – Get a quote
Get in touch with me using this form or one of the communication channels below and please provide me with the following information about your project:
- Link to the source code repository and definition of files, folders or contracts in scope.
In case of a private repository, please invite @MarioPoneder as a collaborator. - Relevant specifications, documentation and previous audit reports, if already available depending on the current stage of your project.
- Link to the parent project, in case this is a fork.
- Your projected timeline, i.e. do you need a security review now or in a few weeks/months?
- Further questions or information from your side.
ℹ️ Important
All non-public information shared with me will be treated as confidential.
2. Preparation for kick-off – Determining our collaboration
Once you provided me with the required information, I will proceed to pre-review your codebase and get back to you for scheduling a call – could also be a chat if you prefer – in order to cover the following topics:
- First findings walkthrough, in case I could already identify bugs/vulnerabilities during the pre-review.
- Locking the commit hash for the main security review.
- Breakdown of the quote and downpayment. See also Price model – Severity matrix.
The quote is based on a severity-tiered per-finding price model. You are free to opt for a fixed hourly rate instead, if you prefer. - Determining if our collaboration is the right fit for both sides.
- Setting the timeline for the main security review.
ℹ️ Important
All findings identified during the pre-review are free of charge, irrespective of you proceeding to collaborate with me or not.
3. Main security review – Communication is key
Apart from being focused on the full security assessment of your codebase, the main security review involves the following aspects:
- A kick-off call – optional, but highly recommended – where you provide me with in-depth insights into your protocol and/or a walkthrough of select parts of the codebase.
This will give me a headstart into the security review which usually turns out to be beneficial when identifying vulnerabilities. - Every time a relevant finding is uncovered, I will proceed to share it with you immediately via our dedicated communication channel – could also be a new issue in a private repository – including recommended mitigation steps and a runnable proof-of-concept, depending on the complexity of the finding.
This way, you can already work on issue mitigation in parallel to the security review. - At the end of the main review, you will receive a preliminary report in Markdown format covering all the bugs/vulnerabilities which were identified to date.
There might also be multiple non-critical findings and recommendations which are better wrapped up in a dedicated call instead of being part of the report.
⚠️ Warning
Despite the relentless striving to uncover all bugs/vulnerabilities within a given codebase, this process is mainly bound by time and expertise. Consequently, no security researcher including myself can guarantee 100% security and flawless future functionality after a review.
A security review is no substitute for an overall security strategy, but yet an important component of it.
4. Mitigation review – Finalization
Once the main review has concluded, it only takes the following steps to get the best out of the issue mitigation phase:
- Please comment on each bug/vulnerability outlined in the preliminary report with a link to the commit that resolves it or acknowledge it as “won’t fix”.
Thereby, it is best practice to fix only one issue within one commit for clarity. - Each of your mitigation commits will be reviewed concerning correctness and security.
Note that new features, comprehensive refactoring or architectural changes are not part of the mitigation review. - At the end of the mitigation review, you will receive a finalized report in Markdown format covering all previously uncovered bugs/vulnerabilities and their reviewed mitigation measures.
The report will be delivered as a PDF file, if requested.
📝 Note
Although I can understand your wish to keep the final report confidential, I’d highly appreciate your approval to publish it.
Extra: Ongoing security consulting – I’ve got your back
This service is independent from the security review and can be booked separately on demand.
I am here to help you with your future security concerns, e.g.:
- Deploying and initializing your protocol on-chain, i.e. going live.
- Reviewing new contracts and other changes on protocol upgrades.
Basically a light version of the above security review. - Bug bounty report analysis and mitigation consulting.