Blockchain needs standards

Without security audit standards, apps built on blockchain will continue to fall prey to hacks and exploits

OPINION
article-image

Frame Fusion Art/Shutterstock modified by Blockworks

share

The 2023 crypto winter has been challenging for many, not least the thieves who target crypto wallets, platforms and token protocols. So far this year, they’ve only managed to steal $1 billion in crypto assets — a steep fall from 2022’s record $3.8 billion

Unfortunately, the decline appears to have more to do with a reduction in available capital than with stronger defenses. And while the scale of attacks has fallen, their frequency has in fact risen sharply: from 60 hacks in 2022 to 75 as of the end of October. And the year isn’t over.

If decentralized finance is ever to be widely accepted by retail and institutional investors, then it needs to achieve its goal of democratizing global finance. 

We must collectively do better at closing the loopholes that malicious actors are forever looking to slip through. 

The key to locking the door against bad actors? We need to vastly improve security auditing, which, at present, is inconsistent at best and a rubber-stamp exercise at worst. 

Specifically, our industry as a whole needs to adopt a consistent auditing methodology for decentralized technology that is rigorous, standardized and repeatable — as robust as what protects traditional finance.

Such an auditing standard, coupled with a public commitment by auditing firms to the principle of responsible disclosure — the willingness to call out projects that refuse to listen to or act on recommendations — will encourage projects themselves to raise their security standards.

Atomic Wallet’s refusal to heed a February 2022 public disclosure of serious security vulnerabilities by auditor Least Authority resulted in the loss of more than $100 million to hackers in June 2023. 

At its best, a third-party security audit is a thorough investigation by a skilled team that analyzes every aspect of a system’s design and implementation, seeking out weaknesses and flaws that could affect operations or users — or offer bad actors access to sensitive data or assets. 

A good audit also carefully assesses whether developers and designers have adhered to best practices in a system’s creation and roll-out.

Vulnerabilities come in many forms; incorrect or insufficiently secure cryptography, sensitive information leaks, unprotected system parts, inconsistencies between system design documentation and the code used in implementation.

Weaknesses like these can result in anything from the exposure of sensitive and secret user data to the loss of user and system assets.

That audits are as detailed — and consistent — as possible is therefore essential to both a project and its users’ safety.

There are dozens of firms out there offering audit services, but with no industry standard, quality can and does indeed vary drastically. Even within reputable firms, there is neither consensus on what should be audited nor a consistent set of yardsticks.

There is, of course, no guarantee that even the most experienced auditors will either sniff out every weakness in a system or protect every user from loss. But if they are thoroughly and regularly carried out, security audits have been proven to sharply reduce the risk of a serious vulnerability going undetected.

Read more from our opinion section: It’s time for blockchain security firms to join forces

However, audits can’t stop social engineering attacks — those that involve the manipulation of human beings — such as when North Korean group Lazarus convinced engineers at an unidentified crypto exchange earlier this year to download malware disguised as an arbitrage bot. Preventing that type of attack only comes from vigilance and team training. 

It is true that every audit will be different, just as every project is different. 

But my long experience in the security auditing space has taught me there are specific steps an auditor must take to maximize the effectiveness of the security audit for the benefit of clients, users and the ecosystem.  

What are these requirements? An auditing standard that aims to make decentralized systems more resilient and protect their users from potential losses must include an exhaustive assessment of the following: 

  • The project’s threat model 
  • The security by design 
  • The security of implementation
  • The use of dependencies
  • Testing 
  • Project documentation
  • The scope of the audit, and whether or not it is sufficient.

To ensure that any improvement in standards benefits blockchain as a whole, we also advocate knowledge-sharing and the creation of public goods such as research, tooling and training.

By working together to improve the standards of the security auditing industry as a whole — and thus the decentralized technology sphere — we can go a long way toward stopping the blockchain black hat hackers from breaking 2022’s record for crypto assets stolen.

And that’s one record we don’t want to see broken again.



Start your day with top crypto insights from David Canellis and Katherine Ross. Subscribe to the Empire newsletter.

Explore the growing intersection between crypto, macroeconomics, policy and finance with Ben Strack, Casey Wagner and Felix Jauvin. Subscribe to the On the Margin newsletter.

The Lightspeed newsletter is all things Solana, in your inbox, every day. Subscribe to daily Solana news from Jack Kubinec and Jeff Albus.

Tags

Upcoming Events

Salt Lake City, UT

MON - TUES, OCT. 7 - 8, 2024

Blockworks and Bankless in collaboration with buidlbox are excited to announce the second installment of the Permissionless Hackathon – taking place October 7-8 in Salt Lake City, Utah. We’ve partnered with buidlbox to bring together the brightest minds in crypto for […]

Salt Lake City, UT

WED - FRI, OCTOBER 9 - 11, 2024

Permissionless is a conference for founders, application developers, and users. Come meet the next generation of people building and using crypto.

recent research

Research Report Templates (1).png

Research

Solana Mobile is a highly ambitious foray into the mobile consumer hardware market, seeking to open up a crypto-native distribution channel for mobile-first applications. The market for Solana Mobile devices has demonstrated a phenomenon whereby external market actors (e.g. Solana-native projects) continuously underwrite subsidies to Mobile consumers. The value of these subsidies, coming in the form of airdrops, trial programs, and exclusive NFT mints, have consistently covered the cost of the phone and generated positive returns for consumers. Given this trend in subsidies, the unit economics in the market for Mobile devices, and the initial growth rate and trajectory of sales, it should be expected that Solana mobile can clear 1M to 10M units over the coming years. As more devices circulate amongst users, Solana Mobile presents a promising venue for the emergence of killer-applications uniquely enabled by this mobile-first, crypto-native distribution channel.

article-image

Plus, breaking down Donald Trump’s shifting crypto stance

article-image

Markets are holding relatively steady despite the supply shock

article-image

Analysts are looking ahead to August, a historically volatile month made more interesting this year by the US presidential election

article-image

Plus, a look into Lighting Labs’ newest feature

article-image

Crypto’s Wild West era is over — it’s time to embrace regulation to secure the future of digital assets

article-image

Plus, Solana has now surpassed Ethereum in trailing 30-day decentralized exchange volume