From fcd1f2b8b705a3eadf66f319e0433922de969dc7 Mon Sep 17 00:00:00 2001 From: Eason Date: Wed, 25 Oct 2023 16:06:26 +0800 Subject: [PATCH 1/3] docs: add security guideline --- docs/security_guideline.mdx | 10 ++++++++++ 1 file changed, 10 insertions(+) create mode 100644 docs/security_guideline.mdx diff --git a/docs/security_guideline.mdx b/docs/security_guideline.mdx new file mode 100644 index 00000000..62804088 --- /dev/null +++ b/docs/security_guideline.mdx @@ -0,0 +1,10 @@ +--- +slug: security +title: Security Guideline +position: 9 +sidebar_position: 9 +--- + +To ensure the stability and security of your Axon chain, please adhere to the following security assumptions: +* **Validator Trustworthiness**: Assume the absence of any malicious entities within the validator list. A secure Axon chain relies on trustworthy validators. +* **High Availability**: To maintain a robust network, it's crucial that at least `(n/3 + 1)` nodes remain online at all times. This level of availability helps safeguard the chain's continuous operation and resilience against potential disruptions. From 79094d82c8611a0be37025b5a197e7eb070ee4db Mon Sep 17 00:00:00 2001 From: Eason Date: Wed, 25 Oct 2023 16:07:28 +0800 Subject: [PATCH 2/3] fix typo --- docs/security_guideline.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/security_guideline.mdx b/docs/security_guideline.mdx index 62804088..56173665 100644 --- a/docs/security_guideline.mdx +++ b/docs/security_guideline.mdx @@ -1,6 +1,6 @@ --- slug: security -title: Security Guideline +title: Security Guidelines position: 9 sidebar_position: 9 --- From 1c38f511e273516623eb7f3e63906dfb731b8f7f Mon Sep 17 00:00:00 2001 From: Eason Date: Wed, 25 Oct 2023 16:08:15 +0800 Subject: [PATCH 3/3] fix typo --- docs/security_guideline.mdx | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/security_guideline.mdx b/docs/security_guideline.mdx index 56173665..f8d1f1a1 100644 --- a/docs/security_guideline.mdx +++ b/docs/security_guideline.mdx @@ -6,5 +6,5 @@ sidebar_position: 9 --- To ensure the stability and security of your Axon chain, please adhere to the following security assumptions: -* **Validator Trustworthiness**: Assume the absence of any malicious entities within the validator list. A secure Axon chain relies on trustworthy validators. +* **Validator Trustworthiness**: Assume the absence of **any malicious** entities within the validator list. A secure Axon chain relies on trustworthy validators. * **High Availability**: To maintain a robust network, it's crucial that at least `(n/3 + 1)` nodes remain online at all times. This level of availability helps safeguard the chain's continuous operation and resilience against potential disruptions.