Assessment reports
Public findings
Back to Zellic site
↗
Assessment reports
>
Radix
>
Threat Model
>
Module: Resource blueprints
General
Overview
Findings
High (1)
Medium (2)
Low (2)
Informational (1)
Discussion
Unique Characteristics of Radix
Threat Model
What are threat models?
1-native-blueprints
Module: Resource blueprints
Resources
Consensus manager
Fungible and nonfungible proofs
Authorization zone
Package
Fungible buckets
Fungible vaults
Fungible resource managers
Validator
Account locker
Worktop
Account
Liquidity pools
Access controller
2-runtime
3-transactions
4-kernel
Audit Results
Assessment Results
Module: Resource blueprints
Zellic © 2025
Back to top ↑