Skip to content

Latest commit

 

History

History
12 lines (7 loc) · 5.03 KB

slashing-sls.md

File metadata and controls

12 lines (7 loc) · 5.03 KB
description
Performing slashable actions leading to penalties.

Slashing (SLS)

Slashing Risks:

IDRisk GroupRisk VectorsRisk Vector Description
SLS1InfrastructureOperational Failure: Single validator signs two different blocksSingle node signs two different blocks, e.g. failure in setting up the anti-slashing mechanism (e.g. no lokal anti-slashing database disabled or deleted) or failure in the validator migration process.
SLS2InfrastructureOperational Failure: Shutting down validator only temporarilyValidator shuts (temporary) down. System spins up a new validator with the same key
SLS3InfrastructureOperational Failure: Validator keys are used on 2 different validatorsSystem takes the same keys twice from the key database and deploys them on two different validators.
SLS4InfrastructureOperational Failure: Failure in setting up the anti-slashing mechanisms correctlyFailure in setting up the anti-slashing mechanisms correctly (e.g. Web3Signer has no slashing protection enabled, no database, database only in memory and not on disk, 2 or several copies of Web3Signer, slashing databse can be deleted)
SLS5InfrastructureDouble key usage in the CI/CD pipelineUsage of same key within different environments causing a slashing
SLS6SoftwareSoftware Bug (e.g. Validator Client) (Intentional or accidentional) through updateNew versions of a validator client that may cause errors that lead to slashing
Supply chain attack
SLS7SoftwareSoftware Bug (e.g. Validator Client) through software customization
New versions of a validator client may cause errors that lead to slashing
SLS8PeopleMalicious Internal Employee intentionally causes operational failure via his given user rightsAnything that an internal employee has access to is at risk of being exploited to sabotage the operation resulting in a slashing incident.
SLS9PeopleMalicious Internal Employee intentionally causes operational failure via privilege escalationA malicious internal employee can get additional rights via through privileges escalation.
SLS10PeopleMalicious Ex-Employee intentionally causes a slashing incidentA Ex-Employee can still have access to the system when his acces is not blocked or removed
SLS11PeopleMalicious External Hacker intentionally causes slashing incidentMalicious External Hacker gets system access through absence of or weak cyber security standards
SLS12PeopleMalicious External Hacker intentionally causes slashing incidentMalicious External Hacker gets external network access to the system
SLS13PeopleMalicious External Hacker intentionally causes operational failure through authentication accessMalicious External Hacker can get access through by-passing or brut-forcing authentication systems
SLS14ProcessOperational Failure: Incorrect implementation of the failover mechanism: Failover system comes unexpectedly onlineIf the failover does not ensure that old system is not still alive in some way or is using a stale version of the anti-slashing database, e.g.: failover system starts accidentally although primary system is not down
SLS15ProcessOperational Failure: Incorrect implementation of the failover mechanism: Primary system comes unexpectedly back onlineIf the failover does not ensure that old system is not still alive in some way or is using a stale version of the anti-slashing database, e.g.: failover system starts (manually / automatically) because primary system is down and primary system comes back online
SLS16ProcessOperational Failure: Slashing monitoring does not prevent system shut downSlashing events keep ongoing on because no slashing monitoring system in place
SLS17ProcessOperational Failure: Slashing monitoring ignores alertsMonitoring is in place, but slashing events keep ongoing on because alerts are not monitored
SLS18ProcessOperational Failure: Slashing monitoring does not shut down the validatorsSlashing keeps going on because system fails to automatically shut down after alerts