Nakamoto Threat Model #4050
jio-gl
started this conversation in
Blockchain
Replies: 1 comment
-
These sections are the largest concerns:
|
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Nakamoto Release Threat Model
Version 0.1
What are we working on?
We are modeling threats for the Nakamoto Release - a new Stacks blockchain design that enables faster and more reliable block production. Key components include:
What can go wrong?
What are we going to do about it?
Did we do a good job?
We can validate the threat model via:
[NTM-1] Smart Contract Threats
.pox-4
contract could allow unauthorized stacking/voting.pox-4
could enable STX lockup or miscalculation of rewardsMitigation Plan
[NTM-1-1]
[NTM-1-2]
[NTM-1-3]
[NTM-2] Stacker Voting Threats
Mitigation Plan
[NTM-2-1]
[NTM-2-2]
[NTM-2-3]
[NTM-2-4]
[NTM-2-5]
[NTM-3] Cryptographic Threats
Mitigation Plan
[NTM-3-1]
[NTM-3-2]
[NTM-3-3]
[NTM-3-4]
[NTM-3-5]
[NTM-3-6]
[NTM-4] Bitcoin Threats
[NTM-4-1] Double spends could burn counterfeit BTC for mining eligibility
[NTM-4-2] Finney attacks could manipulate block-commits for cheap mining
[NTM-4-3] 51% attack reorgs could disrupt Stacks/Bitcoin consensus
[NTM-4-4] Selfish mining could exclude block-commits and disrupt chain
Mitigation Plan
[NTM-4-1]
[NTM-4-2]
[NTM-4-3]
[NTM-4-4]
[NTM-5] Stacks Threats
[NTM-5-1] Eclipse attacks could isolate nodes from canonical chain
[NTM-5-2] Faulty nodes could stall consensus and block production
[NTM-5-3] Congestion could delay inclusion of important transactions
[NTM-5-4] Oracle manipulations can lead to faulty contract executions
[NTM-5-5] Front-running to extract MEV from pending transactions
Mitigation Plan
[NTM-5-1]
[NTM-5-2]
[NTM-5-3]
[NTM-5-4]
[NTM-5-5]
[NTM-6] Governance Threats
[NTM-6-1] Centralized governance could lead to corruption
[NTM-6-2] Inadequate stakeholder input into upgrades
[NTM-6-3] Unclear or flawed dispute resolution mechanisms
[NTM-6-1]
[NTM-6-2]
[NTM-6-3]
[NTM-7] Operational Threats
[NTM-7-1] Bugs and flaws due to insufficient testing
[NTM-7-2] Network outages could stall block production
[NTM-7-3] Lack of monitoring leading to undiscovered failures
[NTM-7-4] Upgrade bugs or incompatibilities disrupt operations
Mitigation Plan
[NTM-7-1]
[NTM-7-2]
[NTM-7-3]
[NTM-7-4]
[NTM-8] Broad Threats
[NTM-8-1] Cryptographic breakthroughs that compromise security
[NTM-8-2] Emergent threats like quantum computing
[NTM-8-3] Changing regulatory landscape creates legal issues
[NTM-8-4] Business failures or partnerships problems
[NTM-8-5] Data breaches and infrastructure attacks
[NTM-8-6] Lack of audits leaving flaws undiscovered
[NTM-8-1]
[NTM-8-2]
[NTM-8-3]
[NTM-8-4]
[NTM-8-5]
[NTM-8-6]
Beta Was this translation helpful? Give feedback.
All reactions