

Admin/privileged access and credentials.
Availability of Ravencoin network.
Reputation of Ravencoin and its stakeholders.
Below is a breakdown of what components and assessment activities are included in this statement of work.
Identification of vulnerable C/C++/TBD code via:
Static analysis
Dynamic analysis
Review of consensus rules as it applies to assets
Review of possible manipulation on block hashes
Review of script processing for asset transactions
Review of proof of work changes
Review of Key/Secrets management
Testing asset related RPC calls
Testing transport security
Note any out-of-date software (where applicable)
API workflow testing for the following where applicable:
Authentication
Authorization
Command injection
Denial of Service via API abuse (Not flooding)
Improper information disclosure
Encryption in transit and at rest
Automated and targeted manual input fuzzing
Targeted source code review
When made available, ISE will perform targeted source code review in conjunction with any dynamic manual testing. ISE analyzes key areas of code (e.g., user input handling, authentication and authorization functions, encryption, etc.) in order to better understand server behavior and more efficiently craft exploits.
출처=http://www.fintechpost.co.kr/news/articleView.html?idxno=118204
ⓒ 4차산업혁명의 중심기술 블록체인밸리(Blockchain Valley), 블록타임스TV