Features Solutions Technology Tokenomics Docs About
Docs / Smart Contracts / Audit Reports

Audit Reports

All TAG IT smart contracts undergo rigorous security audits by leading firms. We are committed to maintaining the highest security standards for our decentralized product authentication platform.

Audit Summary

Below is a comprehensive overview of all security audits conducted on TAG IT Network smart contracts:

Date Auditor Scope Critical High Medium Low Status
Jan 2024 CertiK Full Protocol 0 0 2 5 Resolved
Oct 2023 Trail of Bits Core Contracts 0 1 3 8 Resolved
Jun 2023 OpenZeppelin Initial Review 1 2 4 6 Resolved
All Issues Resolved

All critical, high, and medium severity findings from our audits have been addressed and verified by the respective audit firms.

Latest Audit - January 2024

Our most recent comprehensive audit was conducted by CertiK, one of the leading blockchain security firms.

Audit Scope

Findings Summary

The CertiK audit identified the following issues, all of which have been resolved:

CertiK Skynet Score

TAG IT Network maintains a 94/100 security score on CertiK Skynet, placing us in the top tier of audited DeFi protocols.

Critical Issues Resolved

No critical issues were found in the January 2024 audit, demonstrating the maturity of our codebase following previous audit remediation efforts.

Previous Audits

October 2023 - Trail of Bits

Trail of Bits conducted an in-depth security assessment focusing on our core authentication contracts.

Key Findings (All Resolved)

June 2023 - OpenZeppelin

Our initial smart contract audit was performed by OpenZeppelin, establishing the security foundation for TAG IT Network.

Key Findings (All Resolved)

Security Best Practice

Always verify you are interacting with our official contract addresses listed in the Contract Addresses documentation. Phishing contracts may attempt to impersonate TAG IT Network.

Bug Bounty Program

TAG IT Network maintains an active bug bounty program to incentivize responsible disclosure of security vulnerabilities.

Reward Tiers

Severity Reward Range Examples
Critical $50,000 - $100,000 Fund theft, contract takeover, permanent DoS
High $10,000 - $50,000 Significant fund loss risk, access control bypass
Medium $2,500 - $10,000 Limited fund loss, griefing attacks
Low $500 - $2,500 Minor issues, informational findings

Scope

The following are in scope for our bug bounty program:

How to Report

  1. Document the vulnerability with clear reproduction steps
  2. Include proof-of-concept code if applicable
  3. Submit your report to security@tagit.network
  4. Wait for our security team to acknowledge receipt (within 24 hours)
  5. Work with our team to verify and remediate the issue
Immunefi Partnership

Our bug bounty program is also hosted on Immunefi, providing additional protection and a trusted platform for security researchers.

Security Contact

We take security seriously and encourage responsible disclosure of any vulnerabilities.

Responsible Disclosure Policy

Contact Information

Safe Harbor

Security researchers acting in good faith and following our responsible disclosure policy are protected under our Safe Harbor agreement. We will not pursue legal action against researchers who comply with our guidelines.

Download Reports

Full audit reports are available for download below:

Verification

All PDF reports are cryptographically signed. You can verify authenticity by checking the digital signatures against our public key.

Edit this page on GitHub
Type to search documentation...