This report has been prepared as a product of the ICON Service Engine Audit request by ICON. This audit was conducted to discover issues and vulnerabilities in the source code of ICON’s Service Engine.
Disclaimer:CertiK conducts security assessments on the provided source code exclusively. Conduct your own due diligence before deciding to use any info listed at this page.