{"id":745,"date":"2019-04-23T15:48:41","date_gmt":"2019-04-23T19:48:41","guid":{"rendered":"https:\/\/treehousetechgroup.com\/?page_id=745"},"modified":"2019-05-21T21:03:33","modified_gmt":"2019-05-22T01:03:33","slug":"security-auditing-consultation","status":"publish","type":"page","link":"https:\/\/treehousetechgroup.com\/services\/security-auditing-consultation\/","title":{"rendered":"Security, Auditing and Consultation"},"content":{"rendered":"\n
TTG\u2019s security, auditing and consultation services provide clients with unit testing and code review to ensure alignment with best practices and compliance with ERC-20 token standards. We also create test cases, run automated and manual tests, and document results.<\/p>\n
Our vulnerability and penetration assessment includes code review, in addition to an automated and manual assessment that tests against edge cases identified in the code review to scrutinize areas of concern and propose fixes.<\/p>\n
We also conduct small automated ICO simulations and a GAS\/cost analysis of the ICO.<\/p>\n
SECURITY, AUDITING & CONSULTATION TTG\u2019s security, auditing and consultation services provide clients with unit testing and code review to ensure alignment with best practices and compliance with ERC-20 token standards. We also create test cases, run automated and manual tests, and document results. Vulnerability and Penetration Assessment Our vulnerability and penetration assessment includes code review,…<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":7,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-745","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"\n