Development resources at your finger tips
Build with the coolest Web3 projects
Recurring funding for Open Source
Ethical ads to power Open Source
Learn about Web3 & earn rewards
Show appreciation for each other
Meet fellow developers, designers, futurists and more. Collaborate and BUIDL awesome projects together.
Discover great web3 organizations, work on meaningful projects and build relationships with like minded people. Browse Tribes
Meet the top hunters and contributors from our community.
KERNEL is an 8-week, invite-only program for top tech talent looking to build relationships, products, and companies in blockchain and Web 3. 100 tal…
Heyo Gitcoiners! With an entire city of hackers, coders and blockchain innovators relocated on our platform, the atmosphere is just buzzing with crea…
Type in [[ 2- term.length]] more characters to get results
[[ result.title ]]
[[ result.description | truncate(70) ]]
No matches found
Gitcoin is GDPR complaint. Learn more in
Gitcoin's Terms & Conditions.
Check out the Issue Explorer
Looking to fund some work? You can submit a new Funded Issue here.
This ticket is to implement 3 testcases with our [`testworld` p2p simulation frame work](https://github.com/centrifuge/go-centrifuge/tree/develop/testworld).
Refer `testworld/README.md` for env setup and a small guide on how to run. Define your tests in `testworld/signature_test.go`. This test involves some research in how to simulate abnormal behaviour by the new host Mallory. A possible way is to define Mallory in https://github.com/centrifuge/go-centrifuge/blob/develop/testworld/park.go#L30 but after initialisation replace her `p2p/receiver/handler.go` with a different implementation (inject with key `bootstrap.BootstrappedPeer` in https://github.com/centrifuge/go-centrifuge/blob/develop/p2p/bootstrapper.go#L44).
* Alice creates a document with Mallory and Mallory signs it with a key that is not in collaborators
* Alice creates a document with Mallory and Mallory returns a signature for a different signing root
* Eve creates a document with Alice but calculates the signing root incorrectly and sends it to Alice.
This issue has a gitcoin bounty attached to it. If you'd like to start working on it, feel free to reach out to me (firstname.lastname@example.org) directly, join our slack channel #bounties on our [slack](