Top Three Threats

Based on the threat modeling on OZKi, we have identified the following top three threats:

  1. Bad or malicious input to the proof function

  2. Unsafe proof function codes

  3. Replay attack on the proof & its output

Last updated