Audit Plan
Document type: Security process
Doc ID: AUDIT-PLAN
Status: Final v0.1
Release date: December 21, 2025
Author: Nicolas Turcotte, Founder
Source repo: dcorps-docs-public (docs/security/AUDIT-PLAN.md)
Last updated: 2026-01-25
Scope: Planning and execution framework for security and code audits across the dCorps protocol, modules, and critical tooling.
1. Objectives and scope
Audits are intended to:
- identify and remediate security vulnerabilities before they are exploited;
- validate correctness of critical protocol logic and implementations;
- build confidence for users, operators, and partners.
Scope priorities:
- core Hub contracts and rollup integration;
- protocol modules with high impact (funds, governance, or recognition);
- critical infrastructure and security tooling where feasible.
Audits are not a guarantee of safety and do not replace ongoing security work.
2. Auditor selection and independence
Auditors:
- have demonstrated expertise in relevant technology stacks;
- are independent from core development teams and major stakeholders where possible;
- disclose any conflicts of interest.
Selection criteria include:
- track record and references;
- capacity to perform in-depth reviews on relevant timelines;
- ability to provide actionable remediation guidance.
Multiple auditors may be engaged over time to reduce concentration risk and provide diverse perspectives.
3. Audit lifecycle
Typical lifecycle:
- Scoping
- define components in scope, timelines, and success criteria;
- prepare threat model excerpts and relevant documentation.
- Pre-audit preparation
- freeze or tag code for review;
- ensure build instructions and tests are accurate and complete.
- Execution
- auditors perform manual review and automated analysis;
- maintain communication channel for clarifications.
- Reporting
- auditors deliver a report with findings, severities, and recommendations;
- teams triage findings and plan remediation.
- Remediation and verification
- implement fixes;
- obtain verification from auditors where applicable;
- publish updated reports and release notes.
Timelines allow for iterative review and fixes before high-risk launches or upgrades.
4. Issue classification and tracking
Findings are classified by:
- severity (e.g. critical, high, medium, low, informational);
- impact area (funds, consensus, data integrity, privacy, performance);
- likelihood (qualitative).
Tracking:
- uses an internal or open issue tracker with appropriate access controls;
- records status (open, in progress, resolved, wont-fix) and resolution details;
- links to relevant commits, patches, and governance decisions.
Critical and high-severity issues are addressed before mainnet launches or major upgrades, unless there is a clearly documented and accepted rationale.
5. Transparency and disclosure
Where legally and practically feasible:
- audit reports are published or summarized for the community;
- known limitations or deferred fixes are clearly identified;
- timelines for future audits are communicated.
Confidentiality constraints (e.g. on specific exploit paths) may require partial or delayed disclosure, but the default posture is transparency balanced with responsible disclosure practices.