There are several levels of protection for the masternodes software:
- at the level of hosting providers;
- at the server OS level;
- at the docker level of the containers, which are the isolated environment in which our software is launched;
- at the level of security policies for administering system resources (DevOps).
In development we use the Sawtooth Framework, at the level of which developers envisage possible vulnerabilities; Intel is also involved in this process. In the software development process, we apply practices that reduce the risk of vulnerabilities, including TDD;
In the future, we plan to conduct an external security audit code or bug bounty program with the global white hacker community.