Skip to main content

Security Policy

Document type: Policy
Doc ID: SECURITY-POLICY
Status: Final v0.1
Release date: December 21, 2025
Author: Nicolas Turcotte, Founder
Source repo: dcorps-docs-public (docs/security/SECURITY-POLICY.md)
Last updated: 2025-12-24

Scope: Security principles, responsibilities, and baseline controls for the dCorps protocol and foundation. This policy is complementary to the Threat Model, Audit Plan, Bug Bounty, and Incident Response documents.


1. Security principles

dCorps adopts the following principles:

  • defense in depth – combine multiple layers of protection across code, infrastructure, process, and governance;
  • least privilege – grant only the access and capabilities required for each role, module, or system;
  • secure by default – prefer safe defaults even if they are less convenient;
  • transparency – favor open discussion of risks and mitigations, consistent with responsible disclosure;
  • continuous improvement – treat security as an ongoing process, not a one-time project.

Security considerations span:

  • core protocol and modules;
  • validators and node operators;
  • foundation operations and treasury;
  • ecosystem tooling and integrations.

2. Roles and responsibilities

Security is a shared responsibility:

  • Core developers
    • design and implement protocol logic with security in mind;
    • maintain secure development practices and code review standards;
    • coordinate technical response to vulnerabilities and incidents.
  • Validators and node operators
    • secure validator infrastructure and signing access;
    • keep software up to date;
    • participate in coordinated incident handling.
  • dCorps Foundation
    • fund audits, bug bounties, and security tooling;
    • coordinate communication with the community and external stakeholders;
    • maintain internal security processes and compliance.
  • Ecosystem developers
    • follow best practices when integrating with dCorps;
    • avoid misrepresenting security guarantees of their own products.

Responsibilities are further detailed in the Threat Model, Audit Plan, and operational runbooks.


3. Secure development lifecycle

Core protocol and critical tooling follow a secure development lifecycle (SDLC) that includes:

  • security-conscious design reviews for new features and changes;
  • static and dynamic analysis where appropriate;
  • mandatory peer review for code changes affecting consensus, cryptography, or funds;
  • structured testing at unit, integration, and system levels;
  • periodic security training for contributors.

Changes that significantly affect security are:

  • documented in design notes or proposals;
  • subjected to targeted review and, where applicable, external audits;
  • accompanied by updates to the Threat Model and related documents.

4. Custody and operational security

dCorps is non-custodial. Validators, entities, and users are responsible for securing their wallets, signing access, and operational procedures.

Foundation and treasury operational security details are maintained internally and are not part of the public documentation set.


5. Infrastructure and operations

Core infrastructure (e.g. reference nodes, build and release systems, critical services):

  • uses hardened configurations and up-to-date operating systems;
  • isolates environments by function (e.g. build, test, production);
  • restricts access via least privilege and strong authentication;
  • is monitored for anomalies and suspicious activity.

Operational guidance covers:

  • safe software release processes (signing, reproducible builds where feasible);
  • secure use of third-party dependencies and services;
  • backups and disaster recovery plans for critical systems.

Validators and ecosystem participants are encouraged to adopt similar best practices, adapted to their own risk profiles.