-
We would like to propose the development of a plugin for ACA-Py to support the `did:cheqd` method, allowing users of the ACA-Py ecosystem to interact with [Cheqd](https://cheqd.io/)'s decentralized id…
ff137 updated
4 weeks ago
-
**Github username:** @Jelev123
**Twitter username:** zhulien_zhelev
**Submission hash (on-chain):** 0x0501b25165916518f6e3cfcadf8c2b8ae723b94f3654750783d73617b57e1fba
**Severity:** medium
**Descript…
-
**Github username:** --
**Twitter username:** --
**Submission hash (on-chain):** 0xe4db50ebca54fe1efeed737ac1f3b2c89aab218583a0b29d77484c6a0945de23
**Severity:** medium
**Description:**
**Descriptio…
-
We've had a few conversations around key and even signature revocations.
While we'll need to support "key revocations" scenarios, the signature revocations scenarios were interesting whether a sig…
-
TLDR: Revocation works fine for the first credential but if I try to revoke a second one in the same status list the ledger returns:
```
"state\":\"failed\",\"reason\":\"unknownError: Request faile…
-
> Regret: Given the challenges of permission annoyance and abuse, it is reasonable for user agents to suppress a site's future requests for the same capability when the first request is blocked. That …
-
Currently, all cryptolinks in the sigchain are considered as **additions** to the sigchain. That is, there's no notion of revocation. As such, `getAllCryptolinks()` simply retrieves all claims from th…
-
The agents are only able to communicate within the local network.
The demo code from aca-py also covers the use of Ngrok.
It should be added after tests
-
Annex 2 §A.2.3.7(VCR_14) & A.2.3.38 (WIRevocation_18): the verification of the revocation status of a PID or an attestation shall be mandatory (SHOULD is used in the requirements) at least in a LoA hi…
-
I've compromised myself 🥇
I added a leaked private key to my brand new BTCR DID :(
Its for testing purposes for https://github.com/decentralized-identity/well-known/pull/2
Since I'm new to B…