LogoLogo
Go to dTip
  • Welcome
  • Getting Started
    • What is dTip?
    • Why dTip
  • Key Features
  • Roadmap
  • How It Works
  • The Vision
  • FAQ
  • Developers
    • Technical Specifications
  • Contribution
  • Security
    • Overview
    • Responsible Reporting
  • Terms
    • Terms of Use
    • Privacy
Powered by GitBook
LogoLogo

@ Ilad

On this page
  • Thread Model
  • Principals (Actors)
  • Goals (Security Properties)
  • Adversities (Threats)
  • Invariants (System Integrity Must-Holds)

Was this helpful?

Edit on GitHub
Export as PDF
  1. Security

Overview

System Security Implications.

PreviousContributionNextResponsible Reporting

Last updated 2 months ago

Was this helpful?

Thread Model

Principals (Actors)

Key actors in the system that can be targeted by threats:

  • Users:

    • Create a profile with their data

    • View a specific profile

  • Official Website (Vercel): Frontend interface for interacting with the smart contract

  • Smart Contract: Stores profile data and enforces rules for modification

  • Blockchain Network (Ethereum L1 & Soneium L2): Processes transactions and stores profile data

  • Website Hosting Provider (Vercel): Delivers the frontend; potential attack vector

Goals (Security Properties)

  • Profile Data Security

    • Only the owner can modify their profile

    • Prevent unauthorized modifications (e.g., smart contract exploits)

  • Profile Data Availability

    • Users should always be able to retrieve profile data, even if the website is down

  • Data Authenticity & Verification

    • Users should be able to verify profile data integrity from the blockchain

    • Verified smart contract ensures authenticity

  • Ease of Use

    • While blockchain verification is possible, most users prefer using the website; maintaining website availability is critical

Adversities (Threats)

a) In Our Control (Can Be Mitigated)

  • Website Downtime (Vercel Issues)

  • Phishing Attacks (Fake dTip Websites)

    • Attackers can clone the website and trick users into interacting with a malicious contract

    • Mitigation:

      • Clear branding and verified domains

        • Encourage users to verify contract addresses before interacting

  • Smart Contract Exploits

    • Unauthorized profile modification due to coding flaws

    • Possible attack vectors: access control issues, storage manipulation

    • Mitigation:

      • White-box Security audits with industry best practices and extensive testing

b) Out of Our Control (But Can Affect dTip's Integrity)

These are external factors that impact dTip but are not directly under our control:

  • Blockchain Congestion (Ethereum L1 & Soneium L2)

    • Transaction delays could impact profile updates

    • No direct mitigation, but users can wait for network conditions to improve

  • L2 Security Risks (Soneium OP Stack)

    • If Soneium experiences a security breach, profile data integrity may be affected

    • Mitigation: Monitor network health and provide fallback options (e.g., consider alternative rollups if Soneium becomes unstable)

  • Blockchain Censorship or Validator Attacks

    • Validators could censor transactions, preventing profile updates

    • While unlikely, this is outside dTip’s control

Invariants (System Integrity Must-Holds)

To ensure dTip remains functional and secure:

  • Profile Data Must Always Be Accessible

    • Even if the website is down, users should access data via blockchain explorersComment

    CommentComment

  • Smart Contract Should Always Enforce Profile Ownership

    • Unauthorized edits should never be possibleComment

    CommentComment

  • Blockchain Networks Must Be Operational

    • Ethereum L1 & Soneium L2 must be running for dTip to workComment

    CommentComment

  • Users Must Always Have an easy Way to Verify Profile Authenticity

    • Either through the official website or directly via the blockchain explorer

Alternative access: Directly from blockchain explorer ()

Mitigation: Users can access data from

Soneium Blockscout
Soneium Blockscout
system diagram
Page cover image