dstack security resources for auditors, researchers, and operators.
dstack has been audited by zkSecurity. See the full audit report.
- Security Model - Threat model, trust boundaries, and verification checklist
- Security Best Practices - Production hardening guide
- CVM Boundaries - Information exchange and isolation details
To report a security vulnerability, email security@phala.network. We will respond within 48 hours.