Business Communication
Project Evaluation
Make a Payment
Perform Security Audit Service
Follow-up Service
| Audit Classification | Audit Category | Audit Subclass |
|---|---|---|
| Production Network Security | DNS Security | DDoS Attack |
| DNS Spoofing | ||
| DNS Redirection | ||
| Load Balancing Strategy | Polling Logic Detection | |
| Firewall Configuration Strategy | Intra-domain Security Strategy | |
| DDoS Defense Strategy | Anti-DDoS Advanced | |
| High Performance Equipment | ||
| CDN Flow Cleaning | ||
| Load Balancing | ||
| Flow Control | ||
| Source Authentication | ||
| Session Mechanism Strategy | ||
| Port Security | Minimize Service Ports | |
| Disable Weak Passwords | ||
| Open SSH Key Login | ||
| Authority Security | Hierarchical Authorization Strategy | |
| CA Certificate/Domain Control | ||
| Personnel Management | ||
| Server Security | Basic configuration security | SSH Private key login |
| Password complex rules | ||
| Prevent root user logging in to SSH | ||
| Modify SSH default port | ||
| Setting up a Jumpserver | ||
| Minimize service ports | ||
| Firewall rules | ||
| Third-party login authentication module | ||
| Logging strategy | ||
| Upgrade and patch strategy | System updates automatically | |
| Application update | ||
| Vulnerability Patch Update | ||
| Third-party module security | Software Vulnerability Review | |
| Encryption defect | ||
| Injection Vulnerability | ||
| Code Vulnerability | ||
| Application Services Security | Security certification signature | |
| Service alarm notification | ||
| Password policy | ||
| Data transmission encryption | ||
| Storage encryption | ||
| Access Control | ||
| Server firewall | ||
| API service security | black and white list of IP | |
| Encrypted connection | ||
| Avoid MITM attacks | ||
| API Injection | ||
| Denial of service attack | ||
| Client connection authentication and authorized access | ||
| WAF service | ||
| Database service security | Certificate encrypted connection | |
| Complex password strategy | ||
| Black and white list of registered addresses | ||
| Configure the Port to Not Allow Public Access | ||
| Multi-replica | ||
| Log retention | ||
| Data Backup | ||
| Software update | ||
| Caching service security | Configure the Port to Not Allow Public Access | |
| Complex password strategy | ||
| Multi-replica | ||
| Data Backup | ||
| encrypted connection | ||
| Update bug patches in a timely manner | ||
| Black and white list of login | ||
| Private key management service security | No open interface | |
| Actively connect external interface to synchronize data | ||
| Data transmission encryption | ||
| Data Backup | ||
| Data encryption storage | ||
| Grab Data to be Signed | ||
| Interface cannot obtain private key data in plain text | ||
| Node service security | IP whitelist restricted access | |
| whitelist restricted access | ||
| Log retention | ||
| Multi-node confirmation data | ||
| Detect if the Program Crashes | ||
| Node upgrade update | ||
| Application security | App running environment security detection strategy | iOS Jailbreak Detection |
| Virtual machine detection | ||
| Android ROOT detection | ||
| App code decompilation strategy | Source code obfuscation | |
| Instruction set obfuscation | ||
| VM Shelling | ||
| Local storage security | Sandbox storage | |
| Key chain security | ||
| Cookie Security | ||
| Cache processing | ||
| Log sensitive information processing | ||
| Communication Security Strategy | Use SSL | |
| Certificate verification | ||
| Authentication and authorization Strategy | Captcha Mechanism Design | |
| Bypassing authentication | ||
| Unauthorized Access | ||
| API Interface Security | Replay Attack | |
| XSS/SQL Injection | ||
| Business Logic Security | Identity Authentication Security | |
| Business Consistent Security | ||
| Business Data Security | ||
| Data Input Format Detection | ||
| Password Recovery Logic | ||
| Confirmation Code Security | ||
| Business Authorization Security | ||
| Business Process Security | ||
| Business Interface Security | ||
| Front-end security | XSS | |
| CSRF | ||
| CORS | ||
| Click Jacking | ||
| Console Code Injection | ||
| Input Security | Command Execution | |
| XXE | ||
| Deserialization | ||
| SSRF | ||
| Overflow | ||
| SQL Injection | ||
| Code Injection | ||
| Template Injection |
| Serial Number | Audit Class | Audit Subclass |
|---|---|---|
| 1 | Static Security Examining | Built-in Function Security |
| Standard Library Security Audit | ||
| Third-party Libraries Security Audit | ||
| Injection Audit | ||
| Serialization Algorithm Audit | ||
| Memory-leak Detection | ||
| Arithmetic Operation Audit | ||
| Resource Consumption Audit | ||
| Exception Handing Audit | ||
| Log Security Audit | ||
| 2 | P2P Security | Number of Node Connections Audit |
| Node Performance Audit | ||
| Message Format Validation | ||
| Communication Encryption Audit | ||
| Alien Attack Audit | ||
| 3 | RPC Security | RPC Permission Audit |
| Malformed Data Request Audit | ||
| Communication Encryption Audit | ||
| CORS Policy Audit | ||
| 4 | Encrypted And Signature Security | Random Number Generation Algorithm Audit |
| Keystore Audit | ||
| Cryptographic Component Call Audit | ||
| Hash Strength Audit | ||
| Length Extension Attack Audit | ||
| Crypto Fuzzing Test | ||
| 5 | Account and Transaction Model Security | Authority Verification Audit |
| Replay Attack Audit | ||
| "False Top-up" Audit | ||
| 6 | System contract security audit | refers to "Smart Contract Security Audit" |
| 7 | Consensus Security | Staking Logic Audit |
| Block Verification Audit | ||
| Merkle-Tree Audit | ||
| 8 | Code Compliance Audit | Code Forking Audit |
| Code Patch Audit | ||
| Roadmap Audit | ||
| Top-up Program Audit |