-
Notifications
You must be signed in to change notification settings - Fork 18
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Inconfido: Flow Verified Projects Ledger (FVPL) #63
Comments
Hi all, Thanks for this submission, we needed a bit of time to review to ensure the deliverables and timelines could map well into some of our plans for FLIP 934. We also needed to orient the milestones to be weighted heavier on deliverables that would help evaluate the efficacy of the proposed solution and adoption of it. Here is our proposed amendments to the milestones, let us know what you think:
Total USD: $65,000 |
Thanks for getting back to us @srinjoyc - we have formally followed up via email after reviewing the updated milestones above. We're happy to proceed, and looking forward to working with Flow alongside FLIP 934. |
@iJrod - Great, consider the grant accepted, and feel free to get started! We will have some paperwork coming your way via email shortly this week! |
Closing this, there are 2 milestones incomplete but it seems like the grant is no longer being worked on. Please email me if this is mistaken: [email protected]. |
Inconfido: Flow Verified Projects Ledger (FVPL)
Grant category
Please select one or more of:
Description
Problem statement
End users have the burden to validate and confirm that the smart contracts they interact with are legitimate and correctly associated with the project. This burden makes users susceptible to hacks and result in the irreversible loss of user funds.
Developers and wallets currently have no way of presenting verified metadata in a human readable way to end users, which would inform them when they are connecting to an unverified and potentially malicious smart contract.
Proposed solution
Impact
We will initially look into Flow’s FLIP on “Interaction Templates” and provide an analysis of pros and cons of using this method to provide human-readable user interaction and protect users against malicious activities. This will help Flow devs in shaping their roadmap for this proposal.
We will then formulate a view on how our security product, FVPL, that stores and uses Web2 and Web3 context for risk scoring could fit in with “Interaction Templates” and the proposed stakeholder roles. This will allow us and the Flow team to better understand how everything will work together to protect its builders and users.
Our ultimate vision is to provide users with clear and actionable data so they can make better decisions when interacting with smart contracts on Flow. FVPL, along with other existing mechanisms such as “Interaction Templates” will provide users with confidence in understanding when they are interacting with verified and secure smart contracts and when they might be executing risky transactions.
Link to “Interaction Templates” FLIP: FLIP #934
Additionally, Flow developers and builders will get enhanced security that they can embed into their projects and allow third-parties to deliver human-readable security for end-users. Builders on Flow will also leverage the security tools we will be providing in the future to encourage safe composability and secure development on Flow.
Summary:
Developers will receive:
Community / ecosystem will receive:
Overall:
Milestones and funding
- Engage recruiter
- Define pay schedule
- Perform interviews / onboarding
- Get job board posting
- Build 3-5 threat scenarios against architecture, including attack steps, and associated risk profile
- Review with interaction template team and provide recommendations
- Design analytics processes to capture trends
- Design mechanism to capture the metadata
- Design normalisation approach
- Create mock ups on UI
- Review with interaction template team and provide recommendations
Team
The text was updated successfully, but these errors were encountered: