Skip to content

Commit 4e0834d

Browse files
authored
Misc updates (#1663)
1 parent 0362deb commit 4e0834d

File tree

4 files changed

+12
-8
lines changed

4 files changed

+12
-8
lines changed

LICENSE-APACHE

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ APPENDIX: How to apply the Apache License to your work.
186186
same "printed page" as the copyright notice for easier
187187
identification within third-party archives.
188188

189-
Copyright [yyyy] [name of copyright owner]
189+
Copyright [2022-2025] The Plonky2 Authors
190190

191191
Licensed under the Apache License, Version 2.0 (the "License");
192192
you may not use this file except in compliance with the License.

LICENSE-MIT

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
The MIT License (MIT)
22

3-
Copyright (c) 2022 The Plonky2 Authors
3+
Copyright (c) 2022-2025 The Plonky2 Authors
44

55
Permission is hereby granted, free of charge, to any person obtaining a copy
66
of this software and associated documentation files (the "Software"), to deal

README.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,10 @@ at your option.
8484

8585
## Security
8686

87-
This code has not yet been audited, and should not be used in any production systems.
87+
This code has been audited prior to the `v1.0.0` release. The audits reports and findings are available in the [audits](./audits/) folder of this repository.
88+
An audited codebase isn't necessarily free of bugs and security exploits, hence we recommend care when using `plonky2` in production settings.
89+
90+
If you find a security issue in the codebase, please refer to our [Security guidelines](./SECURITY.md) for private disclosure.
8891

8992
While Plonky2 is configurable, its defaults generally target 100 bits of security. The default FRI configuration targets 100 bits of *conjectured* security based on the conjecture in [ethSTARK](https://eprint.iacr.org/2021/582).
9093

@@ -93,12 +96,7 @@ Plonky2's default hash function is Poseidon, configured with 8 full rounds, 22 p
9396

9497
## Links
9598

96-
#### Actively maintained
97-
9899
- [Polygon Zero's zkEVM](https://github.com/0xPolygonZero/zk_evm), an efficient Type 1 zkEVM built on top of Starky and plonky2
99-
100-
#### No longer maintained
101-
102100
- [System Zero](https://github.com/0xPolygonZero/system-zero), a zkVM built on top of Starky
103101
- [Waksman](https://github.com/0xPolygonZero/plonky2-waksman), Plonky2 gadgets for permutation checking using Waksman networks
104102
- [Insertion](https://github.com/0xPolygonZero/plonky2-insertion), Plonky2 gadgets for insertion into a list

SECURITY.md

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,11 @@
11
# Polygon Technology Security Information
22

3+
For findings related to plonky2 repository, please contact us with relevant information privately
4+
through our security contact details: security@polygon.technology.
5+
6+
Depending on the severity of the findings, the team may reserve the rights to keep the information private
7+
while addressing it internally, and disclose it along a new release after having informed relevant parties.
8+
39
## Link to vulnerability disclosure details (Bug Bounty).
410
- Websites and Applications: https://hackerone.com/polygon-technology
511
- Smart Contracts: https://immunefi.com/bounty/polygon

0 commit comments

Comments
 (0)