Nakamoto Threat Model #4050
jose-blockchain
started this conversation in
Blockchain
Replies: 1 comment
-
These sections are the largest concerns:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Nakamoto Release Threat Model
Version 0.1
What are we working on?
We are modeling threats for the Nakamoto Release - a new Stacks blockchain design that enables faster and more reliable block production. Key components include:
What can go wrong?
What are we going to do about it?
Did we do a good job?
We can validate the threat model via:
[NTM-1] Smart Contract Threats
.pox-4
contract could allow unauthorized stacking/voting.pox-4
could enable STX lockup or miscalculation of rewardsMitigation Plan
[NTM-1-1]
[NTM-1-2]
[NTM-1-3]
[NTM-2] Stacker Voting Threats
Mitigation Plan
[NTM-2-1]
[NTM-2-2]
[NTM-2-3]
[NTM-2-4]
[NTM-2-5]
[NTM-3] Cryptographic Threats
Mitigation Plan
[NTM-3-1]
[NTM-3-2]
[NTM-3-3]
[NTM-3-4]
[NTM-3-5]
[NTM-3-6]
[NTM-4] Bitcoin Threats
[NTM-4-1] Double spends could burn counterfeit BTC for mining eligibility
[NTM-4-2] Finney attacks could manipulate block-commits for cheap mining
[NTM-4-3] 51% attack reorgs could disrupt Stacks/Bitcoin consensus
[NTM-4-4] Selfish mining could exclude block-commits and disrupt chain
Mitigation Plan
[NTM-4-1]
[NTM-4-2]
[NTM-4-3]
[NTM-4-4]
[NTM-5] Stacks Threats
[NTM-5-1] Eclipse attacks could isolate nodes from canonical chain
[NTM-5-2] Faulty nodes could stall consensus and block production
[NTM-5-3] Congestion could delay inclusion of important transactions
[NTM-5-4] Oracle manipulations can lead to faulty contract executions
[NTM-5-5] Front-running to extract MEV from pending transactions
Mitigation Plan
[NTM-5-1]
[NTM-5-2]
[NTM-5-3]
[NTM-5-4]
[NTM-5-5]
[NTM-6] Governance Threats
[NTM-6-1] Centralized governance could lead to corruption
[NTM-6-2] Inadequate stakeholder input into upgrades
[NTM-6-3] Unclear or flawed dispute resolution mechanisms
[NTM-6-1]
[NTM-6-2]
[NTM-6-3]
[NTM-7] Operational Threats
[NTM-7-1] Bugs and flaws due to insufficient testing
[NTM-7-2] Network outages could stall block production
[NTM-7-3] Lack of monitoring leading to undiscovered failures
[NTM-7-4] Upgrade bugs or incompatibilities disrupt operations
Mitigation Plan
[NTM-7-1]
[NTM-7-2]
[NTM-7-3]
[NTM-7-4]
[NTM-8] Broad Threats
[NTM-8-1] Cryptographic breakthroughs that compromise security
[NTM-8-2] Emergent threats like quantum computing
[NTM-8-3] Changing regulatory landscape creates legal issues
[NTM-8-4] Business failures or partnerships problems
[NTM-8-5] Data breaches and infrastructure attacks
[NTM-8-6] Lack of audits leaving flaws undiscovered
[NTM-8-1]
[NTM-8-2]
[NTM-8-3]
[NTM-8-4]
[NTM-8-5]
[NTM-8-6]
Beta Was this translation helpful? Give feedback.
All reactions