forked from terra-money/validator-profiles
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request terra-money#358 from SCV-Security/master
add SCV-Security validator profile
- Loading branch information
Showing
5 changed files
with
64 additions
and
12 deletions.
There are no files selected for viewing
44 changes: 44 additions & 0 deletions
44
validators/terravaloper10c04ysz9uznx2mkenuk3j3esjczyqh0j783nzt/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,44 @@ | ||
--- | ||
Moniker: SCV-Security | ||
Validator: terravaloper10c04ysz9uznx2mkenuk3j3esjczyqh0j783nzt | ||
Email: [email protected] | ||
Website: https://scv.services | ||
Twitter: @scv_security | ||
--- | ||
|
||
![SCV-Security](logo.png) | ||
|
||
## SCV Security | ||
|
||
SCV contributes directly to the security posture of Terra’s ecosystem through open-source initiatives and researching. | ||
|
||
Our primary focus is to deliver holistic, comprehensive security assurance by employing offensive hacking and pen-testing alongside regular audits. | ||
|
||
SCV has more than 15 years of experience in the cyber security industry and have been involved in the hacker culture for much longer. | ||
|
||
We recruit the best talent we can find. | ||
|
||
## Services Offering - Offensive Security Assurance | ||
|
||
- **Advanced Penetration Testing** | ||
- Ensure the underlying application and infrastructure are secure against vulnerabilities and threats. | ||
- **Adversary Simulation (Red Team)** | ||
- A highly targeted attack simulation designed to test all parties, providing the organisation with a realistic simulation to learn from, like "live fire" exercises. High value targets are identified pre-engagement and the Red Team engages using attacks crafted specifically for the engagement. | ||
- **Cloud Security Assessment** | ||
- Review of cloud environments and their configuration against best security practices, to minimise the attack surface. | ||
- **Security Code Review** | ||
- Identifying security related weaknesses in source code, ideally before deployment and before attackers get the opportunity. | ||
- **Social Engineering** | ||
- We simulate an active attack or execute its impact to test the security awareness of an individual or a group of people. For example, Phishing techniques. | ||
- **DevSecOps and Automation** | ||
- Ensure that the CI/CD and other automation is configured securely, to best practices, and implement automated security testing within the pipeline. | ||
- **OSINT** | ||
- Finding identifying information about the organisation and any team members. Particularly information that could be misused. Anonymity could be important, and OSINT tries to break anonymity by connecting all the dots. | ||
|
||
## Contact Us | ||
|
||
The best way to have a quick answer is: [email protected] or [@scv_security](https://twitter.com/scv_security) | ||
|
||
### Website | ||
|
||
https://twitter.com/scv_security |
Binary file added
BIN
+88.5 KB
validators/terravaloper10c04ysz9uznx2mkenuk3j3esjczyqh0j783nzt/logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
8 changes: 8 additions & 0 deletions
8
validators/terravaloper10c04ysz9uznx2mkenuk3j3esjczyqh0j783nzt/profile.json
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
{ | ||
"contact": { | ||
"email": "[email protected]", | ||
"telegram": "@unl1k3ly", | ||
"twitter": "https://twitter.com/scv_security", | ||
"keybase": "https://keybase.io/scvsecurity" | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,17 +1,22 @@ | ||
--- | ||
Moniker: SCV Security | ||
Moniker: SCV-Security | ||
Validator: terravaloper1k5hw6rl060zpnnjhgnvky9cs8evrts2g2l28tt | ||
Email: [email protected] | ||
Website: https://scv.services | ||
Twitter: @TerraSCV | ||
Twitter: @scv_security | ||
--- | ||
|
||
![SCV-Security](logo.png) | ||
|
||
## SCV Security | ||
SCV are a trusted provider in the Terra network offering security services for organisations, projects and smart contracts on Terra. | ||
|
||
We believe that security requires consistent effort and vigilance. There is no one correct approach to security for everyone, with threats and vulnerabilities evolving quickly and unique to each environment. At SCV we are working to improve the security of the Terra ecosystem through open-source initiatives and researching while we engage directly with customers and protocols owners. | ||
SCV contributes directly to the security posture of Terra’s ecosystem through open-source initiatives and researching. | ||
|
||
Our primary focus is to deliver holistic, comprehensive security assurance by employing offensive hacking and pen-testing alongside regular audits. | ||
|
||
SCV has more than 15 years of experience in the cyber security industry and have been involved in the hacker culture for much longer. | ||
|
||
We recruit the best talent we can find. | ||
|
||
## Services Offering - Offensive Security Assurance | ||
|
||
|
@@ -29,16 +34,11 @@ We believe that security requires consistent effort and vigilance. There is no o | |
- Ensure that the CI/CD and other automation is configured securely, to best practices, and implement automated security testing within the pipeline. | ||
- **OSINT** | ||
- Finding identifying information about the organisation and any team members. Particularly information that could be misused. Anonymity could be important, and OSINT tries to break anonymity by connecting all the dots. | ||
- **Continuous Security** | ||
- Any combination of the above, provided on a continual basis. | ||
|
||
## Team | ||
SCV has more than 15 years of experience in the cyber security industry and have been involved in the hacker culture for much longer. We recruit the best talent, so that you can build with assurance. | ||
|
||
## Contact Us | ||
|
||
The best way to have a quick answer is: [email protected] or [@unl1k3ly](https://twitter.com/unl1k3ly) | ||
The best way to have a quick answer is: [email protected] or [@scv_security](https://twitter.com/scv_security) | ||
|
||
### Website | ||
|
||
https://twitter.com/TerraSCV | ||
https://twitter.com/scv_security |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -2,7 +2,7 @@ | |
"contact": { | ||
"email": "[email protected]", | ||
"telegram": "@unl1k3ly", | ||
"twitter": "https://twitter.com/TerraSCV", | ||
"twitter": "https://twitter.com/scv_security", | ||
"keybase": "https://keybase.io/scvsecurity" | ||
} | ||
} |