The amount of US dollar value at risk, or lost, at this point, is $200-300M.
3/ A bridge is a blockchain application that bridges value between two blockchains together.
In this case, Wormhole was bridging ETH from Ethereum Mainnet to Solana.
4/ A good overview on bridges is in this @_prestwich's presentation "Building bridges, not wallet gardens"
5/ I believe this sets the hack the second most successful DeFi hack over history. Note that centralised exchange hacks like MtGox, Thodex, BitFinex, BitMart might be bigger.
6/ To establish the root cause, let's look at technical analysis first.
๐๐๐
7/ The hack focuses on Solana smart contract programming concept called Sysvar Instructions
8/ @KudelskiSec has a detailed and friendly run down in their blog. Even software developers that do not possess Solana or #rustlang experience can follow the line of thought
13/ Thus, the root cause of the incident be broken down to
- Designing an unsafe API (Solana "developer experience" mistake)
- Using this unsafe API (Wormhole team)
- Not notifying the Wormhole team about the potential upcoming incident (Solana security team)
14/ Aftermath.
Is Solana insecure?
๐๐๐
A risk registry is a tool that TradFi fintechs use to classify risks and create risk matrix for regulators about their business.
15/ In your business there exist
- Inherited risk, due to the nature of business
- Mitigations
- Residual risk after mitigations
16/ In Solana's case inherited risk comes due to use of novel blockchain technology and Linus Tolvard's law of eyeballs:
17/ This means that more developers you have, over time, all bugs will be found in an #opensource code base and none are left.
18/ Solana has not had enough time and developers have yet to become mature e.g. Ethereum, which had a headstart since 2014.
There exists more code that needs more eyeballs to read it.
19/ This is the nature of the software: only time can produce mature software, nothing else. Solana devs cannot speed up time. The inherited risk will be there for a few more years at least: Solana is new - it will have issues with a new product.
20/ This leaves us mitigations to bring down the inherited risk.
Mitigations are happening, we can see load_instruction_at() -> load_instruction_at_checked() commit was done in October 2021.
21/ But are mitigations enough and how can they be improved?
I do not know the details of the Solana security researcher scene, I have only familiarity with Bitcoin/Ethereum auditors and security research.
22/ Ethereum has private chat rooms where security researchers can discuss and alert each other with some implied assumed privacy (though this assumption is simply so called gentlemen's agreement.)
23/ Such a group could have alerted Wormhole team of vulnerable code in Nov-Dec 2021 and prevented the issue.
If such a Solana security chat group exists please invite me in.
24/ Solana will definitely learn from this incident.
25/ Aftermath #2.
Shitting on Solana and Jump Trading.
๐๐๐
26/ Jump Trading, a very rich Chicago based HFT firm, owns Certus One, the developer of Wormhole (I did not verify this.)
They gapped the missing 120k ETH from their own balance sheet.
27/ What else could they have done? This is the only move to signal that they are committed and adults who clean after their own mess.
28/ Coinbase did a similar move in 2017 and reimbursed traders in a flash crash.
This ensured the traders can trust Coinbase (though I disagree giving people back money of losing trades does not set a good precedence.)
29/ Certus One did not do anything especially bad from the engineering standpoint. Solana devs are good as Ethereum devs.
30/ While I am all about shitting on borderline scam projects like Wonderland and their criminal founders, Wormhole or Solana are not such a project.
31/ Risks cannot be totally got rid of. Risks will realise. In the contemporary blockchain business, unlike in 2017 when Ethereum was going through similar issues, stakes are higher.
High stakes mean there will be higher losses, now and then.
32/ Also, because the issue was a smart contract bug, a similar incident can happen to L2s, though the inherited risk is lower. I bet my left kidney at least one L2 will blow up in 2022-2024 in a similar fashion.
33/ FIN
Now up to the mountain hiking trail to clean it up from trash.
Ps. On secure defaults: #Ethereum ERC-20 approve() / transferFrom() should be renamed to
It is going to be a really short thread, the #DeFi historian promises.
Also, any reader will also become a prolific #javascript developer after reading this.
Storytime.
๐๐๐
2/ Web3 originally meant three different APIs injected to web context. This was circa 2015-2016.
Web = web context
3 = three different APIs
Web + 3 = web3.
But what does this mean?
3/ API stands for Application Programming Interface. It tells how applications (developed by a software developer) can communicate with other applications that they have not developed themselves.
For example, how your wallet can communicate with #Ethereum is defined by API.
In the light of the recent event of a prop trading firm losing big monies in an old-fashioned Microsoft Word attachment attack, let me sip my tea and try to remember what kind of hacks I have seen over the years.
๐๐๐
2/ I will skip all retail-focused attacks, like fake websites and weak passwords and only focus on serious cases where tanotable business pitself was a victim.
3/ Also no talk about SIM swapping etc. as it is the US only problem and only possible because the US does not have strong ids issued by the government (don't live in a crap nation plz.)
So you pulled off a successful blackhat hack, or you just happen to run a profitable ransomware operation. How to convert your profits to Lambos?
Let the daddy godfather @moo9000 to tell you, a thread.
๐๐๐
2/ This is in the light of the the recent OFAC notice against Suex (on paper in Prague, in practice in Russia) money-laundering front. They laundered BTC for the ransomware gangs.
3/ Read this excellent fresh post by @trmlabs on the topic
1/ Climate activist arrested after ProtonMail discloses the IP address.
An interesting case for privacy and why this is significant: A decentralisation and #infosec thread.
Put on your Guy Fawkes masks now.
๐๐๐
2/ "@ProtonMail received a legal request from Europol through Swiss authorities to provide information about Youth for Climate action in Paris, they provided the IP address and information on the type of device used to the police"