The audits are performed by certified auditors, except for the ones ordered by the pro-Trump crowd in PA and AZ.
Open source the software? Yeah, so hackers get a chance to look for flaws? Are you nuts. There are usually pre-election audits of both the hardware and software...referred to as risk audits. Since you don't really understand the process, that must have escaped you.
Chain of custody says who had the materials...not what they did with them. The fact that Logan/Cyber Sphincters would not allow media observers except for OANN should tell you all you need to know....then there was the legal action by Logan to hide their methods...so they could claim they found fraud, but not have to tell anyone how they discovered it. Yet you, lemming like, follow the forensic audit bullshit right on down that rabbit hole.
What do you think a forensic audit includes that was not done in the other states as part of their audits?