Root docs
Repository viewer
Legacy docs parity surface
Back to repository viewer
Repository document
Confidential Payments Audit Scope
confidential-payments-audit-scope.md
Boundary
This route preserves legacy markdown access inside the Next.js surface. The raw repository file remains authoritative.
Open raw file<!-- SPDX-License-Identifier: AGPL-3.0-or-later -->
Confidential Payments Audit Scope
Audit Objective
Validate that proposal-bound confidential payout plans do not weaken PrivateDAO treasury safety, lifecycle ordering, or execution determinism.
In Scope
- `configure_confidential_payout_plan`
- `execute_confidential_payout_plan`
- proposal and DAO binding for the payout plan PDA
- conflict rejection between confidential payout plans and direct treasury actions
- settlement recipient validation
- token mint and token account validation for token batches
- replay and double-execute resistance
- execution path separation from the standard treasury action path
Questions The Audit Should Answer
- Can a payout plan be rebound to a different proposal or DAO?
- Can the same proposal execute both a direct treasury action and a confidential payout batch?
- Can a funded batch execute twice?
- Can the wrong settlement recipient or wrong mint receive funds?
- Can a partially configured plan reach the execute path?
- Do the on-chain hashes and URI create a stable external review boundary?
External Evidence Expected
- real wallet captures for salary and bonus flows
- explorer links for configure and execute transactions
- operator confirmation that the settlement recipient process is controlled and reviewable
Related Notes
- [confidential-payments.md](confidential-payments.md)
- [confidential-payroll-flow.md](confidential-payroll-flow.md)
- [audit-handoff.md](audit-handoff.md)