docs: security model concept page#27
Conversation
Explain the IC security model from a developer perspective: execution model (update vs query trust properties), canister isolation and async interleaving, trust boundaries (what the protocol guarantees vs what code must handle), boundary nodes, and the developer threat model (access control, reentrancy, callback traps, cycle drain, unsafe upgrades, controller risk, unverified builds).
Review: Security ModelBlocking issues
Non-blocking improvements
Validation notesDone:
Pending:
|
- Move canister_inspect_message to its own subsection under Trust boundaries - Add link to reproducible builds guide in Unverified builds section - Add brief certified variables explanation in Query calls paragraph - Add SEV-SNP rollout caveat to memory confidentiality bullet
|
Feedback addressed:
|
Summary
canister_inspect_messagelimitationsSync recommendation
Upstream-informed:
dfinity/portal docs/building-apps/best-practices/trust-in-canisters.mdx,general.mdx; icskills:canister-security