Blockchain needs standards

Without security audit standards, apps built on blockchain will continue to fall prey to hacks and exploits

OPINION
article-image

Frame Fusion Art/Shutterstock modified by Blockworks

share

The 2023 crypto winter has been challenging for many, not least the thieves who target crypto wallets, platforms and token protocols. So far this year, they’ve only managed to steal $1 billion in crypto assets — a steep fall from 2022’s record $3.8 billion

Unfortunately, the decline appears to have more to do with a reduction in available capital than with stronger defenses. And while the scale of attacks has fallen, their frequency has in fact risen sharply: from 60 hacks in 2022 to 75 as of the end of October. And the year isn’t over.

If decentralized finance is ever to be widely accepted by retail and institutional investors, then it needs to achieve its goal of democratizing global finance. 

We must collectively do better at closing the loopholes that malicious actors are forever looking to slip through. 

The key to locking the door against bad actors? We need to vastly improve security auditing, which, at present, is inconsistent at best and a rubber-stamp exercise at worst. 

Specifically, our industry as a whole needs to adopt a consistent auditing methodology for decentralized technology that is rigorous, standardized and repeatable — as robust as what protects traditional finance.

Such an auditing standard, coupled with a public commitment by auditing firms to the principle of responsible disclosure — the willingness to call out projects that refuse to listen to or act on recommendations — will encourage projects themselves to raise their security standards.

Atomic Wallet’s refusal to heed a February 2022 public disclosure of serious security vulnerabilities by auditor Least Authority resulted in the loss of more than $100 million to hackers in June 2023. 

At its best, a third-party security audit is a thorough investigation by a skilled team that analyzes every aspect of a system’s design and implementation, seeking out weaknesses and flaws that could affect operations or users — or offer bad actors access to sensitive data or assets. 

A good audit also carefully assesses whether developers and designers have adhered to best practices in a system’s creation and roll-out.

Vulnerabilities come in many forms; incorrect or insufficiently secure cryptography, sensitive information leaks, unprotected system parts, inconsistencies between system design documentation and the code used in implementation.

Weaknesses like these can result in anything from the exposure of sensitive and secret user data to the loss of user and system assets.

That audits are as detailed — and consistent — as possible is therefore essential to both a project and its users’ safety.

There are dozens of firms out there offering audit services, but with no industry standard, quality can and does indeed vary drastically. Even within reputable firms, there is neither consensus on what should be audited nor a consistent set of yardsticks.

There is, of course, no guarantee that even the most experienced auditors will either sniff out every weakness in a system or protect every user from loss. But if they are thoroughly and regularly carried out, security audits have been proven to sharply reduce the risk of a serious vulnerability going undetected.

Read more from our opinion section: It’s time for blockchain security firms to join forces

However, audits can’t stop social engineering attacks — those that involve the manipulation of human beings — such as when North Korean group Lazarus convinced engineers at an unidentified crypto exchange earlier this year to download malware disguised as an arbitrage bot. Preventing that type of attack only comes from vigilance and team training. 

It is true that every audit will be different, just as every project is different. 

But my long experience in the security auditing space has taught me there are specific steps an auditor must take to maximize the effectiveness of the security audit for the benefit of clients, users and the ecosystem.  

What are these requirements? An auditing standard that aims to make decentralized systems more resilient and protect their users from potential losses must include an exhaustive assessment of the following: 

  • The project’s threat model 
  • The security by design 
  • The security of implementation
  • The use of dependencies
  • Testing 
  • Project documentation
  • The scope of the audit, and whether or not it is sufficient.

To ensure that any improvement in standards benefits blockchain as a whole, we also advocate knowledge-sharing and the creation of public goods such as research, tooling and training.

By working together to improve the standards of the security auditing industry as a whole — and thus the decentralized technology sphere — we can go a long way toward stopping the blockchain black hat hackers from breaking 2022’s record for crypto assets stolen.

And that’s one record we don’t want to see broken again.



Start your day with top crypto insights from David Canellis and Katherine Ross. Subscribe to the Empire newsletter.

Explore the growing intersection between crypto, macroeconomics, policy and finance with Ben Strack, Casey Wagner and Felix Jauvin. Subscribe to the Forward Guidance newsletter.

Get alpha directly in your inbox with the 0xResearch newsletter — market highlights, charts, degen trade ideas, governance updates, and more.

The Lightspeed newsletter is all things Solana, in your inbox, every day. Subscribe to daily Solana news from Jack Kubinec and Jeff Albus.

Tags

Upcoming Events

Javits Center North | 445 11th Ave

Tues - Thurs, March 18 - 20, 2025

Blockworks’ Digital Asset Summit (DAS) will feature conversations between the builders, allocators, and legislators who will shape the trajectory of the digital asset ecosystem in the US and abroad.

recent research

Unlocked Advisory.jpg

Research

ACP-125 represents a strategic opportunity to enhance Avalanche's competitive position in the Layer-1 blockchain ecosystem. Based on our previous ACP-77 analysis paired with an analysis of ACP-125, Avalanche is prioritizing kick-starting growth and network effects in its ecosystem while trading off short-term value accrual.

article-image

Daily validator revenue has been in excess of $30 million every day since mid-October

article-image

As part of SIP-411, KWENTA tokens will be redeemable for SNX and subsequently deprecated

article-image

Ethereum’s 200th ACD call brought updates on the Pectra upgrade and the new Mekong testnet — just in time for Devcon in Thailand

article-image

Vance Spencer says Framework won’t be going anywhere

article-image

Mike Novogratz shared some remarks on Trump securing the presidency

article-image

Odds of a second 25bps cut in December are now at 66%, according to CME Group