Vulnerability Disclosure and Cryptocurrencies

in #bitcoin6 years ago (edited)

Introduction

The cryptocurrency ecosystem consists of blockchains, coins, tokens, smart contracts, exchanges and wallets. It is worth billions of dollars, and as such is a target for criminals. Notable incidents include:

Attackers exploit a vulnerability to perform an attack. A vulnerability is a flaw. Flaws can exist in hardware, software and an online service. Exploitation of vulnerabilities can impact the confidentiality, integrity and available of system of information. Exploitation of vulnerabilities in the cryptocurrency eco-system can have a serious financial impact as the above incidents show.

Vulnerability Disclosure and Handling

Developers should be able to receive vulnerability information, collaborate with the vulnerability finder, verify the vulnerability, fix it, and then disseminate the information. There are two International Standards which ideally should be followed: ISO/IEC 290147 and ISO/IEC 33011.

Analysis of the Crypto Eco-System

Some of the recommended practices of a mature vulnerability disclosure program are:

  • publishing a vulnerability policy
  • a means to contact the vendor
  • publishing advisories
  • a bug bounty program

Below is an analysis of how some of the major players in the crypto ecosystem compare against these recommendations.

Analysis of CryptoCurrencies

CoinPolicyContact DetailsAdvisoriesBug Bounty
BitcoinNoYesEmail onlyNo
EthereumNoNoNoNo
RippleNoNoNoNo
Bitcoin CashNoNoNoNo
LiteCoinNoNoNoNo
MoneroYesYesNoYes
VergeNoNoNoNo
ZcashNoYesYesNo
ElectroneumNoNoNoYes
ZcoinNoNoNoNo

As can be seen Monero and Zcash are the most mature in terms of following recommended practices. The main surprise is Verge, who even after a recent vulnerability exploit are still not following recommended practices.

Analysis of CryptoExchanges

ExchangePolicyContact DetailsAdvisoriesBug Bounty
KrakenYesYesNoYes
GeminiYesYesNoNo
CoinbaseYesYesNoYes
BinanceNoNoNoYes
BittrexNoNoNoNo
CEX.ioNoNoNoNo
BitfinexNoNoNoNo

Given the successful hacks on exchanges it would have been expected that exchanges would be leading the way. However, this seems far from the case.

Analysis of CryptoWallets

WalletPolicyContact DetailsAdvisoriesBug Bounty
ParityNoYesNoYes
LedgerNoYesPartialYes
TrezorYesYesYesYes
CoinomiNoNoNoNo
JaxxNoNoNoNo

Trezor seems to following all the recommended practices. Ledger has improved their practices after a recent vulnerability disclosure. The main software wallets (Jaxx and Coinomi) are lagging.

Summary

Given, the huge impact that exploiting vulnerabilities can have on the cryptocurrencies it is both surprisingly and worrying that the major players in the crypto ecosystem are not following recommended practices. Monero, Trezor, Kraken and Coinbase are leading the way, and others should follow suit.

Buyers and users of cryptocurrency should be pushing exchanges, wallet vendors and coin developers to improve their practices.

Donations

If you found this article please feel free to donate BTC to 3Qq8gGi9USjL78wW28KK8S45xwpfZcGnhS

Sort:  

Congratulations @apt99! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 2 years!

You can view your badges on your Steem Board and compare to others on the Steem Ranking

Do not miss the last post from @steemitboard:

SteemitBoard Ranking update - A better rich list comparator
Vote for @Steemitboard as a witness to get one more award and increased upvotes!

Congratulations @apt99! You received a personal award!

Happy Birthday! - You are on the Steem blockchain for 1 year!

Click here to view your Board

Support SteemitBoard's project! Vote for its witness and get one more award!

Coin Marketplace

STEEM 0.16
TRX 0.13
JST 0.027
BTC 58921.34
ETH 2593.61
USDT 1.00
SBD 2.43